Search

Your search keyword '"Matt Bishop"' showing total 114 results

Search Constraints

Start Over You searched for: Author "Matt Bishop" Remove constraint Author: "Matt Bishop" Topic computer.software_genre Remove constraint Topic: computer.software_genre
114 results on '"Matt Bishop"'

Search Results

1. Addressing cyber security skills: the spectrum, not the silo

2. Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education

3. Insider Attack Detection for Science DMZs Using System Performance Data

4. Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes

6. Augmenting Machine Learning with Argumentation

7. Special Session

8. A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation

9. A Design for a Collaborative Make-the-Flag Exercise

10. A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing

11. The dose makes the poison — Leveraging uncertainty for effective malware detection

12. ACM Joint Task Force on Cybersecurity Education

13. Internet- and cloud-of-things cybersecurity research challenges and advances

14. Multiclass classification of distributed memory parallel computations

15. Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters

16. LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications

18. Information Security Education for a Global Digital Society

19. Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior

20. I'm not sure if we're okay

21. Is Anybody Home? Inferring Activity From Smart Home Network Traffic

22. Special Session

23. A Taxonomy of Buffer Overflow Characteristics

24. Are Patched Machines Really Fixed?

25. Live Analysis: Progress and Challenges

26. Virtual Machine Introspection: Observation or Interference?

27. Computer forensics in forensis

29. About Penetration Testing

30. Fixing federal e-voting standards

31. Achieving Learning Objectives through E-Voting Case Studies

32. Traducement

33. Cyber defense technology networking and evaluation

34. The Strategy and Tactics of Information Warfare

35. Realism in Teaching Cybersecurity Research: The Agile Research Process

37. Teaching Security Stealthily

38. Insider Attack Identification and Prevention Using a Declarative Approach

39. A Clinic for 'Secure' Programming

40. Supporting reconfigurable security policies for mobile programs

41. Who owns your computer? [digital rights management

42. Teaching Secure Programming

43. A Human Endeavor: Lessons from Shakespeare and Beyond

44. Antimalware Software: Do We Measure Resilience?

45. Information behaving badly

46. Forgive and forget

47. Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders

48. Introducing secure coding in CS0 and CS1 (abstract only)

49. Conspiracy and information flow in the Take-Grant Protection Model

50. Joining the security education community

Catalog

Books, media, physical & digital resources