Sledovat
Matthew Elder
Matthew Elder
Johns Hopkins University Applied Physics Laboratory
E-mailová adresa ověřena na: jhuapl.edu
Název
Citace
Citace
Rok
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid malcode, 1-10, 2003
3402003
On computer viral infection and the effect of immunization
C Wang, JC Knight, MC Elder
Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 246-256, 2000
2172000
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications …, 2009
1092009
Survivability Architectures: Issues and Approaches
C Wang, JC Knight, MC Elder, KJ Sullivan
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2000
100*2000
Survivability architectures: Issues and approaches
JC Knight, KJ Sullivan, MC Elder, C Wang
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 …, 2000
1002000
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
912002
Specifying user interfaces for safety-critical medical systems
M Elder, J Knight
Proc. of the 2nd Annual International Symposium on Medical Robotics and …, 1995
85*1995
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
792016
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
612014
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
DARPA, Washington DC, 2002
552002
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
432009
The MEERKATS Cloud Security Architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International …, 2012
422012
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
382002
On viral propagation and the effect of immunization
C Wang, JC Knight, MC Elder
Proceedings of 16th ACM Annual Computer Applications Conference, 2000
282000
Fault tolerance in critical information systems
MC Elder
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2001
252001
Security patterns template and tutorial
D Kienzle, M Elder, D Tyree, J Edwards-Hewitt
February, 2002
232002
Error recovery in critical infrastructure systems
JC Knight, MC Elder, X Du
Computer Security, Dependability and Assurance: From Needs to Solutions …, 1998
231998
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
Resilient Control Systems (ISRCS), 2013 6th International Symposium on, 150-155, 2013
222013
Method and apparatus for identifying invariants to detect software tampering
BT Witten, MC Elder
US Patent 8,108,931, 2012
212012
Summaries of three critical infrastructure applications
J Knight, M Elder, J Flinn, P Marx
Computer Science Report No. CS-97-27. Department of Computer Sciences …, 1997
141997
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20