Follow
Matt Bishop
Title
Cited by
Cited by
Year
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
31152003
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
31152003
Introduction to computer security
M Bishop
Addison-Wesley Professional, 2004
8562004
Checking for race conditions in file accesses
M Bishop, M Dilger
Computing systems 2 (2), 131-152, 1996
4451996
Improving system security via proactive password checking
M Bishop, DV Klein
Computers & Security 14 (3), 233-249, 1995
2461995
Property-based testing: a new approach to testing for assurance
G Fink, M Bishop
ACM SIGSOFT Software Engineering Notes 22 (4), 74-80, 1997
2111997
Storm clouds rising: security challenges for IaaS cloud computing
B Hay, K Nance, M Bishop
2011 44th Hawaii International Conference on System Sciences, 1-7, 2011
2102011
A critical analysis of vulnerability taxonomies
M Bishop, D Bailey
Technical Report CSE-96-11, Department of Computer Science at the University …, 1996
2041996
A taxonomy of unix system and network vulnerabilities
M Bishop
Technical Report CSE-95-10, Department of Computer Science, University of …, 1995
2031995
Virtual machine introspection: Observation or interference?
K Nance, M Bishop, B Hay
IEEE Security & Privacy 6 (5), 32-37, 2008
1962008
Vulnerabilities analysis
M Bishop
Proceedings of the Recent Advances in intrusion Detection, 125-136, 1999
1961999
Testing C programs for buffer overflow vulnerabilities
ED Haugh, M Bishop
University of California, Davis, 2002
1912002
Defining the insider threat
M Bishop, C Gates
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
1892008
About penetration testing
M Bishop
IEEE Security & Privacy 5 (6), 84-87, 2007
1842007
Modeling network intrusion detection alerts for correlation
J Zhou, M Heckman, B Reynolds, A Carlson, M Bishop
ACM Transactions on Information and System Security (TISSEC) 10 (1), 4-es, 2007
1682007
Is anybody home? inferring activity from smart home network traffic
B Copos, K Levitt, M Bishop, J Rowe
2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016
1672016
A flexible containment mechanism for executing untrusted code
DS Peterson, M Bishop, R Pandey
11th USENIX Security Symposium (USENIX Security 02), 2002
1532002
The art and science of computer security
MA Bishop
Addison-Wesley Professional, 2002
1452002
Attack class: Address spoofing
LT Heberlein, M Bishop
Proceedings of the 19th National Information Systems Security Conference …, 1996
1231996
The transfer of information and authority in a protection system
M Bishop, L Snyder
Proceedings of the seventh ACM symposium on Operating systems principles, 45-54, 1979
1221979
The system can't perform the operation now. Try again later.
Articles 1–20