Segui
Matthew Elder
Matthew Elder
Johns Hopkins University Applied Physics Laboratory
Email verificata su jhuapl.edu
Titolo
Citata da
Citata da
Anno
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid malcode, 1-10, 2003
3402003
On computer viral infection and the effect of immunization
C Wang, JC Knight, MC Elder
Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 246-256, 2000
2152000
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications …, 2009
1092009
Survivability Architectures: Issues and Approaches
C Wang, JC Knight, MC Elder, KJ Sullivan
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2000
101*2000
Survivability architectures: Issues and approaches
JC Knight, KJ Sullivan, MC Elder, C Wang
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 …, 2000
1012000
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
932002
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
892016
Specifying user interfaces for safety-critical medical systems
M Elder, J Knight
Proc. of the 2nd Annual International Symposium on Medical Robotics and …, 1995
87*1995
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
682014
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
DARPA, Washington DC, 2002
562002
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
462009
The MEERKATS Cloud Security Architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International …, 2012
412012
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
362002
Fault tolerance in critical information systems
MC Elder
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2001
272001
On viral propagation and the effect of immunization
C Wang, JC Knight, MC Elder
Proceedings of 16th ACM Annual Computer Applications Conference, 2000
262000
Method and apparatus for identifying invariants to detect software tampering
BT Witten, MC Elder
US Patent 8,108,931, 2012
242012
Error recovery in critical infrastructure systems
JC Knight, MC Elder, X Du
Computer Security, Dependability and Assurance: From Needs to Solutions …, 1998
241998
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
Resilient Control Systems (ISRCS), 2013 6th International Symposium on, 150-155, 2013
232013
Security patterns template and tutorial
D Kienzle, M Elder, D Tyree, J Edwards-Hewitt
February, 2002
232002
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
132015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20