Recent worms: a survey and trends DM Kienzle, MC Elder Proceedings of the 2003 ACM workshop on Rapid malcode, 1-10, 2003 | 340 | 2003 |
On computer viral infection and the effect of immunization C Wang, JC Knight, MC Elder Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 246-256, 2000 | 215 | 2000 |
Advances in topological vulnerability analysis S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications …, 2009 | 109 | 2009 |
Survivability Architectures: Issues and Approaches C Wang, JC Knight, MC Elder, KJ Sullivan VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2000 | 101* | 2000 |
Survivability architectures: Issues and approaches JC Knight, KJ Sullivan, MC Elder, C Wang DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 …, 2000 | 101 | 2000 |
Security patterns repository version 1.0 DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt DARPA, Washington DC, 2002 | 93 | 2002 |
System and method for vulnerability risk analysis MC Elder, DM Kienzle, PK Manadhata, RK Persaud US Patent 9,317,692, 2016 | 91 | 2016 |
Specifying user interfaces for safety-critical medical systems M Elder, J Knight Proc. of the 2nd Annual International Symposium on Medical Robotics and …, 1995 | 88* | 1995 |
Detecting network devices and mapping topology using network introspection by collaborating endpoints D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki US Patent 8,844,041, 2014 | 72 | 2014 |
Final technical report: Security patterns for web application development DM Kienzle, MC Elder DARPA, Washington DC, 2002 | 56 | 2002 |
Validation of secure sockets layer communications D Kienzle, M Elder US Patent 7,634,811, 2009 | 46 | 2009 |
The MEERKATS Cloud Security Architecture AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ... Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International …, 2012 | 42 | 2012 |
Security patterns for web application development DM Kienzle, MC Elder University of Virginia technical report, 2002 | 36 | 2002 |
Fault tolerance in critical information systems MC Elder VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2001 | 27 | 2001 |
On viral propagation and the effect of immunization C Wang, JC Knight, MC Elder Proceedings of 16th ACM Annual Computer Applications Conference, 2000 | 26 | 2000 |
Method and apparatus for identifying invariants to detect software tampering BT Witten, MC Elder US Patent 8,108,931, 2012 | 24 | 2012 |
Error recovery in critical infrastructure systems JC Knight, MC Elder, X Du Computer Security, Dependability and Assurance: From Needs to Solutions …, 1998 | 24 | 1998 |
Cloud resiliency and security via diversified replica execution and monitoring A Benameur, NS Evans, MC Elder Resilient Control Systems (ISRCS), 2013 6th International Symposium on, 150-155, 2013 | 23 | 2013 |
Security patterns template and tutorial D Kienzle, M Elder, D Tyree, J Edwards-Hewitt February, 2002 | 23 | 2002 |
Determining model information of devices based on network device identifiers DM Kienzle, MC Elder, NS Evans US Patent 9,135,293, 2015 | 13 | 2015 |