388 results on '"Matt Bishop"'
Search Results
2. Case Study: Mapping an E-Voting Based Curriculum to CSEC2017.
3. Toward Common Weakness Enumerations in Industrial Control Systems.
4. Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces.
5. SecTutor: An Intelligent Tutoring System for Secure Programming.
6. A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
7. Measuring Self-efficacy in Secure Programming.
8. Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education.
9. A Brief History and Overview of WISE.
10. Information Security and Privacy - Challenges and Outlook.
11. Trust-Based Security; Or, Trust Considered Harmful.
12. Education for the Multifaith Community of Cybersecurity.
13. Insider Attack Detection for Science DMZs Using System Performance Data.
14. Anomaly Detection for Science DMZs Using System Performance Data.
15. Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense.
16. Validation of a Secure Programming Concept Inventory.
17. A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model.
18. Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense.
19. Design Patterns for Compensating Controls for Securing Financial Sessions.
20. Learning Principles and the Secure Programming Clinic.
21. Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles.
22. Augmenting Machine Learning with Argumentation.
23. Contrasting the CSEC 2017 and the CAE Designation Requirements.
24. Concept Inventories in Cybersecurity Education: An Example from Secure Programming.
25. A Design for a Collaborative Make-the-Flag Exercise.
26. Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense.
27. A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing.
28. The dose makes the poison - Leveraging uncertainty for effective malware detection.
29. LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
30. Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters.
31. Cybersecurity Curricular Guidelines.
32. Evaluating Secure Programming Knowledge.
33. Introduction to the Minitrack on Inside the Insider Threat.
34. I'm not sure if we're okay: uncertainty for attackers and defenders.
35. Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior.
36. Is Anybody Home? Inferring Activity From Smart Home Network Traffic.
37. Introduction to the Minitrack on Inside the Insider Threats.
38. Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes.
39. Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example.
40. A new method for flow-based network intrusion detection using inverse statistical physics.
41. Realism in Teaching Cybersecurity Research: The Agile Research Process.
42. Insider Threat Identification by Process Analysis.
43. Insider Attack Identification and Prevention Using a Declarative Approach.
44. Special Session: Joint Task Force on Cybersecurity Education.
45. Leveraging Uncertainty for Effective Malware Mitigation.
46. Information behaving badly.
47. Forgive and forget: return to obscurity.
48. Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders.
49. Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems.
50. Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.