


Остановите войну!
for scientists:


default search action
Matt Bishop
Person information

- affiliation: University of California, Davis, Department of Computer Science
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c127]Kimberly Ferguson-Walter, Sunny Fugate, Cliff Wang, Matt Bishop:
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. HICSS 2023: 845 - [c126]Muwei Zheng
, Nathan Swearingen
, Steven Mills
, Croix Gyurek
, Matt Bishop
, Xukai Zou
:
Case Study: Mapping an E-Voting Based Curriculum to CSEC2017. SIGCSE (1) 2023: 514-520 - [c125]Ida Ngambeki
, Matt Bishop
, Jun Dai
, Phillip Nico
:
Validation of a Secure Programming Concept Inventory. SIGCSE (2) 2023: 1423 - 2022
- [j53]Ruimin Sun
, Marcus Botacin
, Nikolaos Sapountzis, Xiaoyong Yuan
, Matt Bishop
, Donald E. Porter, Xiaolin Li
, Andre Gregio
, Daniela Oliveira
:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. IEEE Trans. Dependable Secur. Comput. 19(1): 353-369 (2022) - [c124]Sunny Fugate, Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter:
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. HICSS 2022: 1-2 - [c123]Ida Ngambeki
, Matt Bishop
, Jun Dai
, Phillip Nico
, Shiven Mian
, Ong Thao, Tran Ngoc Bao Huynh
, Zed Chance
, Isslam Alhasan
, Motunrola Afolabi
:
SecTutor: An Intelligent Tutoring System for Secure Programming. World Conference on Information Security Education 2022: 17-28 - [i8]Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matt Bishop, Karl N. Levitt:
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles. CoRR abs/2203.00150 (2022) - 2021
- [j52]Camila F. T. Pontes
, Manuela M. C. de Souza
, João J. C. Gondim
, Matt Bishop, Marcelo Antonio Marotta
:
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model. IEEE Trans. Netw. Serv. Manag. 18(2): 1125-1136 (2021) - [c122]Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter, Sunny Fugate:
Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense. HICSS 2021: 1-2 - [c121]Matt Bishop
, Lynette Drevin
, Lynn Futcher
, Wai Sze Leung
, Natalia G. Miloslavskaya
, Erik L. Moore
, Jacques Ophoff
, Suné von Solms
:
A Brief History and Overview of WISE. World Conference on Information Security Education 2021: 3-9 - [c120]Ryan Hosler
, Xukai Zou
, Matt Bishop
:
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education. World Conference on Information Security Education 2021: 27-43 - [c119]Matt Bishop
, Ida Ngambeki
, Shiven Mian
, Jun Dai
, Phillip Nico
:
Measuring Self-efficacy in Secure Programming. World Conference on Information Security Education 2021: 81-92 - [p3]Steven Furnell
, Paul S. Haskell-Dowland
, Manish Agrawal
, Richard L. Baskerville
, Anirban Basu
, Matt Bishop
, Jorge Cuéllar, Sara Foresti
, Lynn Futcher
, Nurit Gal-Oz
, Teju Herath
, Christian Damsgaard Jensen
, Allen C. Johnston
, Wouter Joosen, Giovanni Livraga
, Javier López
, Stephen Marsh, Fabio Martinelli, Fabio Massacci
, Aljosa Pasic
, Stef Schinagl
, Abbas Shahim, Kerry-Lynn Thomson
, Jaideep Vaidya
, Tony Vance
, Merrill Warkentin
:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [c118]Ross K. Gegan, Brian Perry, Dipak Ghosal, Matt Bishop:
Insider Attack Detection for Science DMZs Using System Performance Data. CNS 2020: 1-9 - [c117]Jason Clark, Matt Bishop, Frank L. Greitzer:
Introduction to the Minitrack on Inside the Insider Threat. HICSS 2020: 1-2 - [c116]Ross K. Gegan, Christina Mao, Dipak Ghosal, Matt Bishop, Sean Peisert
:
Anomaly Detection for Science DMZs Using System Performance Data. ICNC 2020: 492-496 - [c115]Abe Singer, Matt Bishop:
Trust-Based Security; Or, Trust Considered Harmful. NSPW 2020: 76-89 - [c114]Steven Furnell
, Matt Bishop
:
Education for the Multifaith Community of Cybersecurity. WISE 2020: 32-45
2010 – 2019
- 2019
- [c113]Jason Clark, Matt Bishop, Candice Hoke:
Introduction to the Minitrack on Inside the Insider Threats. HICSS 2019: 1-2 - [c112]Matt Bishop
, Melissa Dark, Lynn Futcher
, Johan Van Niekerk
, Ida Ngambeki, Somdutta Bose, Minghua Zhu:
Learning Principles and the Secure Programming Clinic. World Conference on Information Security Education 2019: 16-29 - [c111]Marc J. Dupuis, Camelia Bejan, Matt Bishop, Scott David, Brent Lagesse:
Design Patterns for Compensating Controls for Securing Financial Sessions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1437-1443 - [i7]Camila F. T. Pontes, João J. C. Gondim, Matt Bishop, Marcelo Antonio Marotta:
A new method for flow-based network intrusion detection using inverse statistical physics. CoRR abs/1910.07266 (2019) - 2018
- [j51]Kim-Kwang Raymond Choo
, Matt Bishop, William Bradley Glisson
, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74: 275-276 (2018) - [c110]Ida Ngambeki, Phillip Nico, Jun Dai, Matt Bishop
:
Concept Inventories in Cybersecurity Education: An Example from Secure Programming. FIE 2018: 1-5 - [c109]Matt Bishop, Jay P. Kesan, Jason Clark:
Introduction to the Minitrack on Insider Threats to Governments and Organizations. HICSS 2018: 1 - [c108]Wm. Arthur Conklin, Matt Bishop:
Contrasting the CSEC 2017 and the CAE Designation Requirements. HICSS 2018: 1-7 - [c107]Matt Bishop
:
A Design for a Collaborative Make-the-Flag Exercise. World Conference on Information Security Education 2018: 3-14 - [c106]Matt Bishop
, Carrie Gates, Karl N. Levitt:
Augmenting Machine Learning with Argumentation. NSPW 2018: 1-11 - [c105]Diana L. Burley, Matt Bishop
, Siddharth Kaza, David S. Gibson, Scott Buck, Allen Parrish, Herb Mattord:
Special Session: Joint Task Force on Cybersecurity Education. SIGCSE 2018: 918-919 - [e8]Marco Carvalho, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan:
Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018. ACM 2018, ISBN 978-1-4503-6597-0 [contents] - [i6]Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira:
Leveraging Uncertainty for Effective Malware Mitigation. CoRR abs/1802.02503 (2018) - 2017
- [j50]Anandarup Sarkar, Sven Köhler, Bertram Ludäscher, Matt Bishop
:
Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. IEEE Syst. J. 11(2): 522-533 (2017) - [j49]Leon J. Osterweil, Matt Bishop
, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Sean Peisert
:
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example. ACM Trans. Priv. Secur. 20(2): 5:1-5:31 (2017) - [c104]Ruimin Sun, Xiaoyong Yuan
, Andrew Lee, Matt Bishop
, Donald E. Porter, Xiaolin Li, André Grégio
, Daniela Oliveira:
The dose makes the poison - Leveraging uncertainty for effective malware detection. DSC 2017: 123-130 - [c103]Matt Bishop, Kara L. Nance, Jason Clark:
Introduction to Inside the Insider Threat Minitrack. HICSS 2017: 1 - [c102]Richard C. Linger, Luanne Chamberlain, Matt Bishop, Melissa Dark:
Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters. HICSS 2017: 1-10 - [c101]Kara L. Nance, Matt Bishop:
Introduction to Deception, Digital Forensics, and Malware Minitrack. HICSS 2017: 1 - [c100]Matt Bishop
, Diana L. Burley, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David S. Gibson, Elizabeth K. Hawthorne, Siddharth Kaza, Yair Levy
, Herbert J. Mattord, Allen Parrish:
Cybersecurity Curricular Guidelines. World Conference on Information Security Education 2017: 3-13 - [c99]Matt Bishop
, Jun Dai, Melissa Dark, Ida Ngambeki, Phillip Nico, Minghua Zhu:
Evaluating Secure Programming Knowledge. World Conference on Information Security Education 2017: 51-62 - [c98]Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop
, Prasant Mohapatra:
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications. INFOCOM 2017: 1-9 - [c97]Sean Peisert
, Matt Bishop
, Edward B. Talbot:
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. NSPW 2017: 80-89 - [c96]Diana L. Burley, Matt Bishop
, Siddharth Kaza, David S. Gibson, Elizabeth K. Hawthorne, Scott Buck:
ACM Joint Task Force on Cybersecurity Education. SIGCSE 2017: 683-684 - [e7]Matt Bishop
, Lynn Futcher, Natalia G. Miloslavskaya
, Marianthi Theocharidou
:
Information Security Education for a Global Digital Society - 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 503, Springer 2017, ISBN 978-3-319-58552-9 [contents] - [i5]Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra:
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications. CoRR abs/1702.01160 (2017) - 2016
- [c95]Matt Bishop, Kara L. Nance, William R. Claycomb:
Introduction to the Inside the Insider Threat Minitrack. HICSS 2016: 2728 - [c94]Kara L. Nance, Matt Bishop:
Introduction to Digital Forensics - Education, Research and Practice Minitrack. HICSS 2016: 5596 - [c93]Ruimin Sun, Andrew Lee, Aokun Chen, Donald E. Porter, Matt Bishop, Daniela Oliveira:
Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior. ISSRE 2016: 388-399 - [c92]Mark E. Fioravanti II, Matt Bishop
, Richard Ford:
I'm not sure if we're okay: uncertainty for attackers and defenders. NSPW 2016: 1-10 - [c91]Diana L. Burley, Matt Bishop
, Elizabeth K. Hawthorne, Siddharth Kaza, Scott Buck, Lynn Futcher:
Special Session: ACM Joint Task Force on Cyber Education. SIGCSE 2016: 234-235 - [c90]Bogdan Copos, Karl N. Levitt, Matt Bishop, Jeff Rowe:
Is Anybody Home? Inferring Activity From Smart Home Network Traffic. IEEE Symposium on Security and Privacy Workshops 2016: 245-251 - [e6]Matt Bishop, Anderson C. A. Nascimento:
Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings. Lecture Notes in Computer Science 9866, Springer 2016, ISBN 978-3-319-45870-0 [contents] - 2015
- [j48]Ruimin Sun, Matt Bishop, Natalie C. Ebner, Daniela Oliveira, Donald E. Porter:
The Case for Unpredictability and Deception as OS Features. login Usenix Mag. 40(4) (2015) - [c89]Kara L. Nance, Matt Bishop:
Introduction to Digital Forensics: Education, Research, and Practice Minitrack. HICSS 2015: 5227 - [c88]Ruimin Sun, Donald E. Porter, Daniela Oliveira, Matt Bishop:
The Case for Less Predictable Operating System Behavior. HotOS 2015 - [c87]Melissa Dark, Matt Bishop
, Richard C. Linger, Luanne Goldrich:
Realism in Teaching Cybersecurity Research: The Agile Research Process. World Conference on Information Security Education 2015: 3-14 - [e5]Matt Bishop, Natalia G. Miloslavskaya
, Marianthi Theocharidou
:
Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 453, Springer 2015, ISBN 978-3-319-18499-9 [contents] - 2014
- [c86]Kara L. Nance, Matt Bishop:
Introduction to Digital Forensics: Education, Research, and Practice Minitrack. HICSS 2014: 4827 - [c85]Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert
:
Insider Threat Identification by Process Analysis. IEEE Symposium on Security and Privacy Workshops 2014: 251-264 - [c84]Anandarup Sarkar, Sven Köhler, Sean Riddle, Bertram Ludäscher, Matt Bishop:
Insider Attack Identification and Prevention Using a Declarative Approach. IEEE Symposium on Security and Privacy Workshops 2014: 265-276 - 2013
- [j47]Sean Whalen, Sean Peisert
, Matt Bishop:
Multiclass classification of distributed memory parallel computations. Pattern Recognit. Lett. 34(3): 322-329 (2013) - [c83]Kara L. Nance, Matt Bishop, Amelia Phillips:
Introduction to Digital Forensics - Education, Research, and Practice Minitrack. HICSS 2013: 4879 - [c82]Helen Armstrong, Matt Bishop
, Colin J. Armstrong:
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders. World Conference on Information Security Education 2013: 11-19 - [c81]Matt Bishop, Emily Rine Butler, Kevin R. B. Butler
, Carrie Gates, Steven Greenspan:
Forgive and forget: return to obscurity. NSPW 2013: 1-10 - [c80]Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun:
Information behaving badly. NSPW 2013: 107-118 - [c79]Blair Taylor, Matt Bishop, Elizabeth K. Hawthorne, Kara L. Nance:
Teaching secure coding: the myths and the realities. SIGCSE 2013: 281-282 - [c78]Matt Bishop
, Blair Taylor, Elizabeth K. Hawthorne, Diana L. Burley, Siddharth Kaza:
Introducing secure coding in CS0 and CS1 (abstract only). SIGCSE 2013: 761 - 2012
- [j46]Matt Bishop, Sean Peisert
:
Security and Elections. IEEE Secur. Priv. 10(5): 64-67 (2012) - [j45]Sean Whalen, Sophie Engle
, Sean Peisert
, Matt Bishop:
Network-theoretic classification of parallel computation patterns. Int. J. High Perform. Comput. Appl. 26(2): 159-169 (2012) - [j44]Matt Bishop, Sophie Engle
, Damien Howard, Sean Whalen:
A Taxonomy of Buffer Overflow Characteristics. IEEE Trans. Dependable Secur. Comput. 9(3): 305-317 (2012) - [c77]Brian Hay, Kara L. Nance, Matt Bishop, Lucas McDaniel:
Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud. HICSS 2012: 5473-5479 - [c76]Sean Peisert
, Edward B. Talbot, Matt Bishop:
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems. NSPW 2012: 15-26 - [c75]Blair Taylor, Matt Bishop
, Diana L. Burley, Steve Cooper, Ronald C. Dodge, Robert C. Seacord
:
Teaching secure coding: report from summit on education in secure software. SIGCSE 2012: 581-582 - [c74]Huong Phan, George S. Avrunin, Matt Bishop, Lori A. Clarke, Leon J. Osterweil:
A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them. EVT/WOTE 2012 - 2011
- [j43]Matt Bishop
:
Teaching Security Stealthily. IEEE Secur. Priv. 9(2): 69-71 (2011) - [j42]Matt Bishop:
Computer security in the future. ISC Int. J. Inf. Secur. 3(1): 3-27 (2011) - [c73]Matt Bishop, Brian Hay, Kara L. Nance:
Applying Formal Methods Informally. HICSS 2011: 1-8 - [c72]Brian Hay, Kara L. Nance, Matt Bishop:
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. HICSS 2011: 1-7 - [c71]Matt Bishop
, Chip Elliott:
Robust Programming by Example. World Conference on Information Security Education 2011: 140-147 - [c70]Matt Bishop, Kara L. Nance:
The Strengths and Challenges of Analogical Approaches to Computer Security Education. World Conference on Information Security Education 2011: 211-217 - [c69]Marco Ramilli, Matt Bishop, Shining Sun:
Multiprocess malware. MALWARE 2011: 8-13 - [c68]Matt Bishop, Richard Ford, Marco Ramilli:
Results-oriented security. MALWARE 2011: 42-49 - [c67]Matt Bishop, Marco M. Carvalho
, Richard Ford, Liam M. Mayron:
Resilience is more than availability. NSPW 2011: 95-104 - [c66]Michael Clifford, Matt Bishop:
Trust of medical devices, applications, and users in pervasive healthcare. PETRA 2011: 54 - [c65]Carrie Gates, Matt Bishop:
One of These Records Is Not Like the Others. TaPP 2011 - 2010
- [j41]Matt Bishop
:
A Clinic for "Secure" Programming. IEEE Secur. Priv. 8(2): 54-56 (2010) - [j40]Edward B. Talbot, Deborah A. Frincke, Matt Bishop:
Demythifying Cybersecurity. IEEE Secur. Priv. 8(3): 56-59 (2010) - [j39]Matt Bishop
:
Technology, Training, and Transformation. IEEE Secur. Priv. 8(5): 72-75 (2010) - [c64]Marco Ramilli, Matt Bishop:
Multi-stage delivery of malware. MALWARE 2010: 91-97 - [c63]Matt Bishop, Justin Cummins, Sean Peisert
, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal
, Deborah A. Frincke, Michael A. Hogarth:
Relationships and data sanitization: a study in scarlet. NSPW 2010: 151-164 - [c62]Carrie Gates, Matt Bishop:
The security and privacy implications of using social networks to deliver healthcare. PETRA 2010 - [c61]Sean Whalen, Matt Bishop, James P. Crutchfield:
Hidden Markov Models for Automated Protocol Learning. SecureComm 2010: 415-428 - [c60]Peter G. Neumann, Matt Bishop, Sean Peisert
, Marv Schaefer:
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. IEEE Symposium on Security and Privacy 2010: 3-13 - [c59]Borislava I. Simidchieva, Sophie Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, Leon J. Osterweil:
Modeling and Analyzing Faults to Improve Election Process Robustness. EVT/WOTE 2010 - [p2]Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15 - [p1]Matt Bishop, Sophie Engle
, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert
, Sean Whalen:
A Risk Management Approach to the "Insider Threat". Insider Threats in Cyber Security 2010: 115-137 - [e4]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010. Dagstuhl Seminar Proceedings 10341, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [e3]Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents] - [i4]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010 - [i3]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010
2000 – 2009
- 2009
- [j38]Brian Hay, Matt Bishop, Kara L. Nance:
Live Analysis: Progress and Challenges. IEEE Secur. Priv. 7(2): 30-37 (2009) - [j37]Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno:
Are Patched Machines Really Fixed? IEEE Secur. Priv. 7(5): 82-85 (2009) - [j36]Stephen Cooper, Christine Nickell, Victor P. Piotrowski Jr., Brenda Oldfield, Ali E. Abdallah, Matt Bishop
, Bill Caelli, Melissa Dark, Elizabeth K. Hawthorne, Lance J. Hoffman, Lance C. Pérez, Charles P. Pfleeger, Richard A. Raines, Corey D. Schou, Joel Brynielsson:
An exploration of the current state of information assurance education. ACM SIGCSE Bull. 41(4): 109-125 (2009) - [c58]Kara L. Nance, Brian Hay, Matt Bishop:
Investigating the Implications of Virtual Machine Introspection for Digital Forensics. ARES 2009: 1024-1029 - [c57]Matt Bishop:
Reflections on UNIX Vulnerabilities. ACSAC 2009: 161-184 - [c56]Matt Bishop, Sophie Engle
, Sean Peisert
, Sean Whalen, Carrie Gates:
Case Studies of an Insider Framework. HICSS 2009: 1-10 - [c55]Kara L. Nance, Brian Hay, Matt Bishop:
Digital Forensics: Defining a Research Agenda. HICSS 2009: 1-6 - [c54]Sean Peisert
, Matt Bishop, Alec Yasinsac:
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10 - [c53]Matt Bishop
:
Some "Secure Programming" Exercises for an Introductory Programming Class. World Conference on Information Security Education 2009: 226-232 - [c52]Matt Bishop, Carrie Gates, Jeffrey Hunker:
The sisterhood of the traveling packets. NSPW 2009: 59-70 - [c51]Sean Peisert
, Matt Bishop, Laura Corriss, Steven J. Greenwald:
Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal. NSPW 2009: 71-84 - [c50]Bhume Bhumiratana, Matt Bishop:
Privacy aware data sharing: balancing the usability and privacy of datasets. PETRA 2009 - [c49]Zhengyi Le, Matt Bishop, Fillia Makedon:
Strong mobile device protection from loss and capture. PETRA 2009 - [c48]Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff:
E-Voting and Forensics: Prying Open the Black Box. EVT/WOTE 2009 - 2008
- [j35]Alec Yasinsac, Matt Bishop:
The Dynamics of Counting and Recounting Votes. IEEE Secur. Priv. 6(3): 22-29 (2008) - [j34]Kara L. Nance, Matt Bishop, Brian Hay:
Virtual Machine Introspection: Observation or Interference? IEEE Secur. Priv. 6(5): 32-37 (2008) - [j33]Matt Bishop, Deborah A. Frincke:
Information Assurance Education: A Work In Progress. IEEE Secur. Priv. 6(5): 54-57 (2008) - [c47]Matt Bishop, Carrie Gates:
Defining the insider threat. CSIIRW 2008: 15:1-15:3 - [c46]Alec Yasinsac, Matt Bishop:
Of Paper Trails and Voter Receipts. HICSS 2008: 487 - [c45]Matt Bishop, Sophie Engle
, Sean Peisert
, Sean Whalen, Carrie Gates:
We have met the enemy and he is us. NSPW 2008: 1-12 - [c44]Sean Peisert
, Matt Bishop, Keith Marzullo:
Computer Forensics in Forensis. SADFE 2008: 102-122 - [c43]