Die PERSEUS Systemarchitektur B Pfitzmann, J Riordan, C Stüble, M Waidner, A Weber Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 1-17, 2001 | 111 | 2001 |
A game theoretic approach to strategy determination for dynamic platform defenses KM Carter, JF Riordan, H Okhravi Proceedings of the first ACM workshop on moving target defense, 21-30, 2014 | 95 | 2014 |
A certified e-mail protocol B Schneier, J Riordan Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998 | 75 | 1998 |
System, method and software for supplying activation information to a subsystem JF Riordan, D Alessandri US Patent 7,516,490, 2009 | 71 | 2009 |
Stateless methods for resource hiding and access control support based on URI encryption C Giblin, T Pietraszek, J Riordan, CV Berghe US Patent App. 10/991,580, 2006 | 69 | 2006 |
Towards automated cyber decision support: A case study on network segmentation for security N Wagner, CŞ Şahin, M Winterrose, J Riordan, J Pena, D Hanson, ... 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-10, 2016 | 67 | 2016 |
Methods for operating virtual networks, data network system, computer program and computer program product Y Duponchel, JF Riordan, R Rissmann, DM Zamboni US Patent 7,908,350, 2011 | 59 | 2011 |
Quantitative evaluation of dynamic platform techniques as a defensive mechanism H Okhravi, J Riordan, K Carter Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 57 | 2014 |
Attack signature generation K Julisch, J Riordan US Patent App. 10/558,853, 2007 | 52 | 2007 |
Intrusion detection in data processing systems A Dominique, JF Riordan, A Wespi US Patent 7,568,228, 2009 | 51 | 2009 |
Continuous security metrics for prevalent network threats: introduction and first four metrics RP Lippmann, JF Riordan, TH Yu, KK Watson Massachusetts Inst of Tech Lexington Lincoln Lab, Tech. Rep, 2012 | 49 | 2012 |
Towards a taxonomy of intrusion detection systems and attacks D Alessandri, C Cachin, M Dacier, O Deak, K Julisch, B Randell, ... Zurich, Switzerland: IBM Research Division, 2001 | 48 | 2001 |
A vulnerability taxonomy methodology applied to web services CV Berghe, J Riordan, F Piessens Proceedings of the 10th Nordic Workshop on Secure IT Systems (NORDSEC2005 …, 2005 | 45 | 2005 |
Configuration and usage pattern of a cloud environment based on iterative learning HE Hockett, CM Laffoon, GV Paramkusham, K Rafferty, JC Riordan, ... US Patent 10,389,586, 2019 | 35 | 2019 |
Access control for computers J Riordan US Patent 7,134,018, 2006 | 35 | 2006 |
A certified e-mail protocol J Riordan, B Schneier 13th Annual Computer Security Applications Conference, 100-106, 1998 | 28 | 1998 |
Building and deploying billy goat, a worm detection system J Riordan, D Zamboni, Y Duponchel Proceedings of the 18th annual FIRST conference 2006 (23), 174, 2006 | 27 | 2006 |
Quantifying the mission impact of network-level cyber defensive mitigations N Wagner, CŞ Şahin, M Winterrose, J Riordan, D Hanson, J Peña, ... The Journal of Defense Modeling and Simulation 14 (3), 201-216, 2017 | 25 | 2017 |
Capturing the security effects of network segmentation via a continuous-time markov chain model N Wagner, CŞ Şahin, J Pena, J Riordan, S Neumayer Proceedings of the 50th Annual Simulation Symposium, 1-12, 2017 | 22 | 2017 |
Agent-based simulation for assessing network security risk due to unauthorized hardware N Wagner, R Lippmann, M Winterrose, J Riordan, T Yu, WW Streilein Proceedings of the Symposium on Agent-Directed Simulation, 18-26, 2015 | 22 | 2015 |