What is computer security? M Bishop IEEE Security & Privacy 99 (1), 67-69, 2003 | 3166 | 2003 |
What is computer security? M Bishop IEEE Security & Privacy 99 (1), 67-69, 2003 | 3166 | 2003 |
Introduction to computer security M Bishop Addison-Wesley Professional, 2004 | 878 | 2004 |
Checking for race conditions in file accesses M Bishop, M Dilger Computing systems 2 (2), 131-152, 1996 | 443 | 1996 |
Improving system security via proactive password checking M Bishop, DV Klein Computers & Security 14 (3), 233-249, 1995 | 250 | 1995 |
Property-based testing: a new approach to testing for assurance G Fink, M Bishop ACM SIGSOFT Software Engineering Notes 22 (4), 74-80, 1997 | 228 | 1997 |
Storm clouds rising: security challenges for IaaS cloud computing B Hay, K Nance, M Bishop 2011 44th Hawaii International Conference on System Sciences, 1-7, 2011 | 213 | 2011 |
A critical analysis of vulnerability taxonomies M Bishop, D Bailey Technical Report CSE-96-11, Department of Computer Science at the University …, 1996 | 204 | 1996 |
A taxonomy of unix system and network vulnerabilities M Bishop Technical Report CSE-95-10, Department of Computer Science, University of …, 1995 | 201 | 1995 |
About penetration testing M Bishop IEEE Security & Privacy 5 (6), 84-87, 2007 | 200 | 2007 |
Vulnerabilities analysis M Bishop Proceedings of the Recent Advances in intrusion Detection, 125-136, 1999 | 197 | 1999 |
Virtual machine introspection: Observation or interference? K Nance, M Bishop, B Hay IEEE Security & Privacy 6 (5), 32-37, 2008 | 196 | 2008 |
Testing C programs for buffer overflow vulnerabilities ED Haugh, M Bishop University of California, Davis, 2002 | 194 | 2002 |
Defining the insider threat M Bishop, C Gates Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 192 | 2008 |
Is anybody home? inferring activity from smart home network traffic B Copos, K Levitt, M Bishop, J Rowe 2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016 | 181 | 2016 |
Modeling network intrusion detection alerts for correlation J Zhou, M Heckman, B Reynolds, A Carlson, M Bishop ACM Transactions on Information and System Security (TISSEC) 10 (1), 4-es, 2007 | 171 | 2007 |
A flexible containment mechanism for executing untrusted code DS Peterson, M Bishop, R Pandey 11th USENIX Security Symposium (USENIX Security 02), 2002 | 150 | 2002 |
The art and science of computer security MA Bishop Addison-Wesley Professional, 2002 | 145 | 2002 |
Attack class: Address spoofing LT Heberlein, M Bishop Proceedings of the 19th National Information Systems Security Conference …, 1996 | 123 | 1996 |
Digital forensics: defining a research agenda K Nance, B Hay, M Bishop 2009 42nd Hawaii International Conference on System Sciences, 1-6, 2009 | 121 | 2009 |