Follow
Matt Bishop
Title
Cited by
Cited by
Year
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
31662003
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
31662003
Introduction to computer security
M Bishop
Addison-Wesley Professional, 2004
8782004
Checking for race conditions in file accesses
M Bishop, M Dilger
Computing systems 2 (2), 131-152, 1996
4431996
Improving system security via proactive password checking
M Bishop, DV Klein
Computers & Security 14 (3), 233-249, 1995
2501995
Property-based testing: a new approach to testing for assurance
G Fink, M Bishop
ACM SIGSOFT Software Engineering Notes 22 (4), 74-80, 1997
2281997
Storm clouds rising: security challenges for IaaS cloud computing
B Hay, K Nance, M Bishop
2011 44th Hawaii International Conference on System Sciences, 1-7, 2011
2132011
A critical analysis of vulnerability taxonomies
M Bishop, D Bailey
Technical Report CSE-96-11, Department of Computer Science at the University …, 1996
2041996
A taxonomy of unix system and network vulnerabilities
M Bishop
Technical Report CSE-95-10, Department of Computer Science, University of …, 1995
2011995
About penetration testing
M Bishop
IEEE Security & Privacy 5 (6), 84-87, 2007
2002007
Vulnerabilities analysis
M Bishop
Proceedings of the Recent Advances in intrusion Detection, 125-136, 1999
1971999
Virtual machine introspection: Observation or interference?
K Nance, M Bishop, B Hay
IEEE Security & Privacy 6 (5), 32-37, 2008
1962008
Testing C programs for buffer overflow vulnerabilities
ED Haugh, M Bishop
University of California, Davis, 2002
1942002
Defining the insider threat
M Bishop, C Gates
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
1922008
Is anybody home? inferring activity from smart home network traffic
B Copos, K Levitt, M Bishop, J Rowe
2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016
1812016
Modeling network intrusion detection alerts for correlation
J Zhou, M Heckman, B Reynolds, A Carlson, M Bishop
ACM Transactions on Information and System Security (TISSEC) 10 (1), 4-es, 2007
1712007
A flexible containment mechanism for executing untrusted code
DS Peterson, M Bishop, R Pandey
11th USENIX Security Symposium (USENIX Security 02), 2002
1502002
The art and science of computer security
MA Bishop
Addison-Wesley Professional, 2002
1452002
Attack class: Address spoofing
LT Heberlein, M Bishop
Proceedings of the 19th National Information Systems Security Conference …, 1996
1231996
Digital forensics: defining a research agenda
K Nance, B Hay, M Bishop
2009 42nd Hawaii International Conference on System Sciences, 1-6, 2009
1212009
The system can't perform the operation now. Try again later.
Articles 1–20