default search action
Matt Bishop
Person information
- affiliation: University of California, Davis, Department of Computer Science
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j54]David M. Nicol, Gregory Shannon, Monika Akbar, Matt Bishop, Michael M. Chaney, Matthew E. Luallen:
Toward Common Weakness Enumerations in Industrial Control Systems. IEEE Secur. Priv. 21(4): 84-93 (2023) - [c129]Muwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou:
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula. HAISA 2023: 36-52 - [c128]Kimberly Ferguson-Walter, Sunny Fugate, Cliff Wang, Matt Bishop:
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. HICSS 2023: 845 - [c127]Muwei Zheng, Nathan Swearingen, Steven Mills, Croix Gyurek, Matt Bishop, Xukai Zou:
Case Study: Mapping an E-Voting Based Curriculum to CSEC2017. SIGCSE (1) 2023: 514-520 - [c126]Ida Ngambeki, Matt Bishop, Jun Dai, Phillip Nico:
Validation of a Secure Programming Concept Inventory. SIGCSE (2) 2023: 1423 - 2022
- [j53]Ruimin Sun, Marcus Botacin, Nikolaos Sapountzis, Xiaoyong Yuan, Matt Bishop, Donald E. Porter, Xiaolin Li, Andre Gregio, Daniela Oliveira:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. IEEE Trans. Dependable Secur. Comput. 19(1): 353-369 (2022) - [c125]Sunny Fugate, Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter:
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. HICSS 2022: 1-2 - [c124]Ida Ngambeki, Matt Bishop, Jun Dai, Phillip Nico, Shiven Mian, Ong Thao, Tran Ngoc Bao Huynh, Zed Chance, Isslam Alhasan, Motunrola Afolabi:
SecTutor: An Intelligent Tutoring System for Secure Programming. World Conference on Information Security Education 2022: 17-28 - [c123]Michael Clifford, Miriam Heller, Karl N. Levitt, Matt Bishop:
Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces. NSPW 2022: 90-103 - [i8]Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matt Bishop, Karl N. Levitt:
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles. CoRR abs/2203.00150 (2022) - 2021
- [j52]Camila F. T. Pontes, Manuela M. C. de Souza, João J. C. Gondim, Matt Bishop, Marcelo Antonio Marotta:
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model. IEEE Trans. Netw. Serv. Manag. 18(2): 1125-1136 (2021) - [c122]Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter, Sunny Fugate:
Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense. HICSS 2021: 1-2 - [c121]Matt Bishop, Lynette Drevin, Lynn Futcher, Wai Sze Leung, Natalia G. Miloslavskaya, Erik L. Moore, Jacques Ophoff, Suné von Solms:
A Brief History and Overview of WISE. World Conference on Information Security Education 2021: 3-9 - [c120]Ryan Hosler, Xukai Zou, Matt Bishop:
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education. World Conference on Information Security Education 2021: 27-43 - [c119]Matt Bishop, Ida Ngambeki, Shiven Mian, Jun Dai, Phillip Nico:
Measuring Self-efficacy in Secure Programming. World Conference on Information Security Education 2021: 81-92 - [p3]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [c118]Ross K. Gegan, Brian Perry, Dipak Ghosal, Matt Bishop:
Insider Attack Detection for Science DMZs Using System Performance Data. CNS 2020: 1-9 - [c117]Jason Clark, Matt Bishop, Frank L. Greitzer:
Introduction to the Minitrack on Inside the Insider Threat. HICSS 2020: 1-2 - [c116]Ross K. Gegan, Christina Mao, Dipak Ghosal, Matt Bishop, Sean Peisert:
Anomaly Detection for Science DMZs Using System Performance Data. ICNC 2020: 492-496 - [c115]Abe Singer, Matt Bishop:
Trust-Based Security; Or, Trust Considered Harmful. NSPW 2020: 76-89 - [c114]Steven Furnell, Matt Bishop:
Education for the Multifaith Community of Cybersecurity. WISE 2020: 32-45
2010 – 2019
- 2019
- [c113]Jason Clark, Matt Bishop, Candice Hoke:
Introduction to the Minitrack on Inside the Insider Threats. HICSS 2019: 1-2 - [c112]Matt Bishop, Melissa Dark, Lynn Futcher, Johan Van Niekerk, Ida Ngambeki, Somdutta Bose, Minghua Zhu:
Learning Principles and the Secure Programming Clinic. World Conference on Information Security Education 2019: 16-29 - [c111]Marc J. Dupuis, Camelia Bejan, Matt Bishop, Scott David, Brent Lagesse:
Design Patterns for Compensating Controls for Securing Financial Sessions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1437-1443 - [i7]Camila F. T. Pontes, João J. C. Gondim, Matt Bishop, Marcelo Antonio Marotta:
A new method for flow-based network intrusion detection using inverse statistical physics. CoRR abs/1910.07266 (2019) - 2018
- [j51]Kim-Kwang Raymond Choo, Matt Bishop, William Bradley Glisson, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74: 275-276 (2018) - [c110]Ida Ngambeki, Phillip Nico, Jun Dai, Matt Bishop:
Concept Inventories in Cybersecurity Education: An Example from Secure Programming. FIE 2018: 1-5 - [c109]Matt Bishop, Jay P. Kesan, Jason Clark:
Introduction to the Minitrack on Insider Threats to Governments and Organizations. HICSS 2018: 1 - [c108]Wm. Arthur Conklin, Matt Bishop:
Contrasting the CSEC 2017 and the CAE Designation Requirements. HICSS 2018: 1-7 - [c107]Matt Bishop:
A Design for a Collaborative Make-the-Flag Exercise. World Conference on Information Security Education 2018: 3-14 - [c106]Matt Bishop, Carrie Gates, Karl N. Levitt:
Augmenting Machine Learning with Argumentation. NSPW 2018: 1-11 - [c105]Diana L. Burley, Matt Bishop, Siddharth Kaza, David S. Gibson, Scott Buck, Allen Parrish, Herb Mattord:
Special Session: Joint Task Force on Cybersecurity Education. SIGCSE 2018: 918-919 - [e8]Marco Carvalho, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan:
Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018. ACM 2018, ISBN 978-1-4503-6597-0 [contents] - [i6]Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira:
Leveraging Uncertainty for Effective Malware Mitigation. CoRR abs/1802.02503 (2018) - 2017
- [j50]Anandarup Sarkar, Sven Köhler, Bertram Ludäscher, Matt Bishop:
Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. IEEE Syst. J. 11(2): 522-533 (2017) - [j49]Leon J. Osterweil, Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Sean Peisert:
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example. ACM Trans. Priv. Secur. 20(2): 5:1-5:31 (2017) - [c104]Ruimin Sun, Xiaoyong Yuan, Andrew Lee, Matt Bishop, Donald E. Porter, Xiaolin Li, André Grégio, Daniela Oliveira:
The dose makes the poison - Leveraging uncertainty for effective malware detection. DSC 2017: 123-130 - [c103]Matt Bishop, Kara L. Nance, Jason Clark:
Introduction to Inside the Insider Threat Minitrack. HICSS 2017: 1 - [c102]Richard C. Linger, Luanne Chamberlain, Matt Bishop, Melissa Dark:
Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters. HICSS 2017: 1-10 - [c101]Kara L. Nance, Matt Bishop:
Introduction to Deception, Digital Forensics, and Malware Minitrack. HICSS 2017: 1 - [c100]Matt Bishop, Diana L. Burley, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David S. Gibson, Elizabeth K. Hawthorne, Siddharth Kaza, Yair Levy, Herbert J. Mattord, Allen Parrish:
Cybersecurity Curricular Guidelines. World Conference on Information Security Education 2017: 3-13 - [c99]Matt Bishop, Jun Dai, Melissa Dark, Ida Ngambeki, Phillip Nico, Minghua Zhu:
Evaluating Secure Programming Knowledge. World Conference on Information Security Education 2017: 51-62 - [c98]Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra:
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications. INFOCOM 2017: 1-9 - [c97]Sean Peisert, Matt Bishop, Edward B. Talbot:
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. NSPW 2017: 80-89 - [c96]Diana L. Burley, Matt Bishop, Siddharth Kaza, David S. Gibson, Elizabeth K. Hawthorne, Scott Buck:
ACM Joint Task Force on Cybersecurity Education. SIGCSE 2017: 683-684 - [e7]Matt Bishop, Lynn Futcher, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education for a Global Digital Society - 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 503, Springer 2017, ISBN 978-3-319-58552-9 [contents] - [i5]Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra:
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications. CoRR abs/1702.01160 (2017) - 2016
- [c95]Matt Bishop, Kara L. Nance, William R. Claycomb:
Introduction to the Inside the Insider Threat Minitrack. HICSS 2016: 2728 - [c94]Kara L. Nance, Matt Bishop:
Introduction to Digital Forensics - Education, Research and Practice Minitrack. HICSS 2016: 5596 - [c93]Ruimin Sun, Andrew Lee, Aokun Chen, Donald E. Porter, Matt Bishop, Daniela Oliveira:
Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior. ISSRE 2016: 388-399 - [c92]Mark E. Fioravanti II, Matt Bishop, Richard Ford:
I'm not sure if we're okay: uncertainty for attackers and defenders. NSPW 2016: 1-10 - [c91]Diana L. Burley, Matt Bishop, Elizabeth K. Hawthorne, Siddharth Kaza, Scott Buck, Lynn Futcher:
Special Session: ACM Joint Task Force on Cyber Education. SIGCSE 2016: 234-235 - [c90]Bogdan Copos, Karl N. Levitt, Matt Bishop, Jeff Rowe:
Is Anybody Home? Inferring Activity From Smart Home Network Traffic. IEEE Symposium on Security and Privacy Workshops 2016: 245-251 - [e6]Matt Bishop, Anderson C. A. Nascimento:
Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings. Lecture Notes in Computer Science 9866, Springer 2016, ISBN 978-3-319-45870-0 [contents] - 2015
- [j48]Ruimin Sun, Matt Bishop, Natalie C. Ebner, Daniela Oliveira, Donald E. Porter:
The Case for Unpredictability and Deception as OS Features. login Usenix Mag. 40(4) (2015) - [c89]Kara L. Nance, Matt Bishop:
Introduction to Digital Forensics: Education, Research, and Practice Minitrack. HICSS 2015: 5227 - [c88]Ruimin Sun, Donald E. Porter, Daniela Oliveira, Matt Bishop:
The Case for Less Predictable Operating System Behavior. HotOS 2015 - [c87]Melissa Dark, Matt Bishop, Richard C. Linger, Luanne Goldrich:
Realism in Teaching Cybersecurity Research: The Agile Research Process. World Conference on Information Security Education 2015: 3-14 - [e5]Matt Bishop, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 453, Springer 2015, ISBN 978-3-319-18499-9 [contents] - 2014
- [c86]Kara L. Nance, Matt Bishop:
Introduction to Digital Forensics: Education, Research, and Practice Minitrack. HICSS 2014: 4827 - [c85]Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert:
Insider Threat Identification by Process Analysis. IEEE Symposium on Security and Privacy Workshops 2014: 251-264 - [c84]Anandarup Sarkar, Sven Köhler, Sean Riddle, Bertram Ludäscher, Matt Bishop:
Insider Attack Identification and Prevention Using a Declarative Approach. IEEE Symposium on Security and Privacy Workshops 2014: 265-276 - 2013
- [j47]Sean Whalen, Sean Peisert, Matt Bishop:
Multiclass classification of distributed memory parallel computations. Pattern Recognit. Lett. 34(3): 322-329 (2013) - [c83]Kara L. Nance, Matt Bishop, Amelia Phillips:
Introduction to Digital Forensics - Education, Research, and Practice Minitrack. HICSS 2013: 4879 - [c82]Helen Armstrong, Matt Bishop, Colin J. Armstrong:
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders. World Conference on Information Security Education 2013: 11-19 - [c81]Matt Bishop, Emily Rine Butler, Kevin R. B. Butler, Carrie Gates, Steven Greenspan:
Forgive and forget: return to obscurity. NSPW 2013: 1-10 - [c80]Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun:
Information behaving badly. NSPW 2013: 107-118 - [c79]Blair Taylor, Matt Bishop, Elizabeth K. Hawthorne, Kara L. Nance:
Teaching secure coding: the myths and the realities. SIGCSE 2013: 281-282 - [c78]Matt Bishop, Blair Taylor, Elizabeth K. Hawthorne, Diana L. Burley, Siddharth Kaza:
Introducing secure coding in CS0 and CS1 (abstract only). SIGCSE 2013: 761 - 2012
- [j46]Matt Bishop, Sean Peisert:
Security and Elections. IEEE Secur. Priv. 10(5): 64-67 (2012) - [j45]Sean Whalen, Sophie Engle, Sean Peisert, Matt Bishop:
Network-theoretic classification of parallel computation patterns. Int. J. High Perform. Comput. Appl. 26(2): 159-169 (2012) - [j44]Matt Bishop, Sophie Engle, Damien Howard, Sean Whalen:
A Taxonomy of Buffer Overflow Characteristics. IEEE Trans. Dependable Secur. Comput. 9(3): 305-317 (2012) - [c77]Brian Hay, Kara L. Nance, Matt Bishop, Lucas McDaniel:
Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud. HICSS 2012: 5473-5479 - [c76]Sean Peisert, Edward B. Talbot, Matt Bishop:
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems. NSPW 2012: 15-26 - [c75]Blair Taylor, Matt Bishop, Diana L. Burley, Steve Cooper, Ronald C. Dodge, Robert C. Seacord:
Teaching secure coding: report from summit on education in secure software. SIGCSE 2012: 581-582 - [c74]Huong Phan, George S. Avrunin, Matt Bishop, Lori A. Clarke, Leon J. Osterweil:
A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them. EVT/WOTE 2012 - 2011
- [j43]Matt Bishop:
Teaching Security Stealthily. IEEE Secur. Priv. 9(2): 69-71 (2011) - [j42]Matt Bishop:
Computer security in the future. ISC Int. J. Inf. Secur. 3(1): 3-27 (2011) - [c73]Matt Bishop, Brian Hay, Kara L. Nance:
Applying Formal Methods Informally. HICSS 2011: 1-8 - [c72]Brian Hay, Kara L. Nance, Matt Bishop:
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. HICSS 2011: 1-7 - [c71]Matt Bishop, Chip Elliott:
Robust Programming by Example. World Conference on Information Security Education 2011: 140-147 - [c70]Matt Bishop, Kara L. Nance:
The Strengths and Challenges of Analogical Approaches to Computer Security Education. World Conference on Information Security Education 2011: 211-217 - [c69]Marco Ramilli, Matt Bishop, Shining Sun:
Multiprocess malware. MALWARE 2011: 8-13 - [c68]Matt Bishop, Richard Ford, Marco Ramilli:
Results-oriented security. MALWARE 2011: 42-49 - [c67]Matt Bishop, Marco M. Carvalho, Richard Ford, Liam M. Mayron:
Resilience is more than availability. NSPW 2011: 95-104 - [c66]Michael Clifford, Matt Bishop:
Trust of medical devices, applications, and users in pervasive healthcare. PETRA 2011: 54 - [c65]Carrie Gates, Matt Bishop:
One of These Records Is Not Like the Others. TaPP 2011 - 2010
- [j41]Matt Bishop:
A Clinic for "Secure" Programming. IEEE Secur. Priv. 8(2): 54-56 (2010) - [j40]Edward B. Talbot, Deborah A. Frincke, Matt Bishop:
Demythifying Cybersecurity. IEEE Secur. Priv. 8(3): 56-59 (2010) - [j39]Matt Bishop:
Technology, Training, and Transformation. IEEE Secur. Priv. 8(5): 72-75 (2010) - [c64]Marco Ramilli, Matt Bishop:
Multi-stage delivery of malware. MALWARE 2010: 91-97 - [c63]Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael A. Hogarth:
Relationships and data sanitization: a study in scarlet. NSPW 2010: 151-164 - [c62]Carrie Gates, Matt Bishop:
The security and privacy implications of using social networks to deliver healthcare. PETRA 2010 - [c61]Sean Whalen, Matt Bishop, James P. Crutchfield:
Hidden Markov Models for Automated Protocol Learning. SecureComm 2010: 415-428 - [c60]Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer:
Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. IEEE Symposium on Security and Privacy 2010: 3-13 - [c59]Borislava I. Simidchieva, Sophie Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, Leon J. Osterweil:
Modeling and Analyzing Faults to Improve Election Process Robustness. EVT/WOTE 2010 - [p2]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15 - [p1]Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen:
A Risk Management Approach to the "Insider Threat". Insider Threats in Cyber Security 2010: 115-137 - [e4]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010. Dagstuhl Seminar Proceedings 10341, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [e3]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents] - [i4]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010 - [i3]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010
2000 – 2009
- 2009
- [j38]Brian Hay, Matt Bishop, Kara L. Nance:
Live Analysis: Progress and Challenges. IEEE Secur. Priv. 7(2): 30-37 (2009) - [j37]Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno:
Are Patched Machines Really Fixed? IEEE Secur. Priv. 7(5): 82-85 (2009) - [j36]Stephen Cooper, Christine Nickell, Victor P. Piotrowski Jr., Brenda Oldfield, Ali E. Abdallah, Matt Bishop, Bill Caelli, Melissa Dark, Elizabeth K. Hawthorne, Lance J. Hoffman, Lance C. Pérez, Charles P. Pfleeger, Richard A. Raines, Corey D. Schou, Joel Brynielsson:
An exploration of the current state of information assurance education. ACM SIGCSE Bull. 41(4): 109-125 (2009) - [c58]Kara L. Nance, Brian Hay, Matt Bishop:
Investigating the Implications of Virtual Machine Introspection for Digital Forensics. ARES 2009: 1024-1029 - [c57]Matt Bishop:
Reflections on UNIX Vulnerabilities. ACSAC 2009: 161-184 - [c56]Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates:
Case Studies of an Insider Framework. HICSS 2009: 1-10 - [c55]Kara L. Nance, Brian Hay, Matt Bishop:
Digital Forensics: Defining a Research Agenda. HICSS 2009: 1-6 - [c54]Sean Peisert, Matt Bishop, Alec Yasinsac:
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10 - [c53]Matt Bishop:
Some "Secure Programming" Exercises for an Introductory Programming Class. World Conference on Information Security Education 2009: 226-232 - [c52]Matt Bishop, Carrie Gates, Jeffrey Hunker:
The sisterhood of the traveling packets. NSPW 2009: 59-70 - [c51]Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald:
Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal. NSPW 2009: 71-84 - [c50]Bhume Bhumiratana, Matt Bishop:
Privacy aware data sharing: balancing the usability and privacy of datasets. PETRA 2009 - [c49]Zhengyi Le, Matt Bishop, Fillia Makedon:
Strong mobile device protection from loss and capture. PETRA 2009 - [c48]Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff:
E-Voting and Forensics: Prying Open the Black Box. EVT/WOTE 2009 - 2008
- [j35]Alec Yasinsac, Matt Bishop:
The Dynamics of Counting and Recounting Votes. IEEE Secur. Priv. 6(3): 22-29 (2008) - [j34]Kara L. Nance, Matt Bishop, Brian Hay:
Virtual Machine Introspection: Observation or Interference? IEEE Secur. Priv. 6(5): 32-37 (2008) - [j33]Matt Bishop, Deborah A. Frincke:
Information Assurance Education: A Work In Progress. IEEE Secur. Priv. 6(5): 54-57 (2008) - [c47]Matt Bishop, Carrie Gates:
Defining the insider threat. CSIIRW 2008: 15:1-15:3 - [c46]Alec Yasinsac, Matt Bishop:
Of Paper Trails and Voter Receipts. HICSS 2008: 487 - [c45]Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates:
We have met the enemy and he is us. NSPW 2008: 1-12 - [c44]Sean Peisert, Matt Bishop, Keith Marzullo:
Computer Forensics in Forensis. SADFE 2008: 102-122 - [c43]David P. Gilliam, Matt Bishop:
Twelfth Securities Technologies (ST) Workshop Report. WETICE 2008: 255-256 - [e2]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Countering Insider Threats, 20.07. - 25.07.2008. Dagstuhl Seminar Proceedings 08302, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [e1]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji:
Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9 [contents] - [i2]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
08302 Abstracts Collection - Countering Insider Threats. Countering Insider Threats 2008 - [i1]Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann:
08302 Summary - Countering Insider Threats. Countering Insider Threats 2008 - 2007
- [j32]Earl T. Barr, Matt Bishop, Mark A. Gondree:
Fixing federal e-voting standards. Commun. ACM 50(3): 19-24 (2007) - [j31]Matt Bishop, David A. Wagner:
Risks of e-voting. Commun. ACM 50(11): 120 (2007) - [j30]Matt Bishop, Deborah A. Frincke:
Achieving Learning Objectives through E-Voting Case Studies. IEEE Secur. Priv. 5(1): 53-56 (2007) - [j29]Sean Peisert, Matt Bishop:
I Am a Scientist, Not a Philosopher! IEEE Secur. Priv. 5(4): 48-51 (2007) - [j28]Matt Bishop:
About Penetration Testing. IEEE Secur. Priv. 5(6): 84-87 (2007) - [j27]Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo:
Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Trans. Dependable Secur. Comput. 4(2): 137-150 (2007) - [j26]Jingmin Zhou, Mark R. Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop:
Modeling network intrusion detection alerts for correlation. ACM Trans. Inf. Syst. Secur. 10(1): 4 (2007) - [c42]Matt Bishop:
E-Voting as a Teaching Tool. World Conference on Information Security Education 2007: 17-24 - [c41]Sean Peisert, Matt Bishop:
How to Design Computer Security Experiments. World Conference on Information Security Education 2007: 141-148 - [c40]Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop:
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. RAID 2007: 127-145 - [c39]Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo:
Toward Models for Forensic Analysis. SADFE 2007: 3-15 - [c38]Elliot Proebstel, Sean Riddle, Francis Hsu, Justin Cummins, Freddie Oakley, Tom Stanionis, Matt Bishop:
An Analysis of the Hart Intercivic DAU eSlate. EVT 2007 - [c37]David P. Gilliam, Matt Bishop, Y. V. Ramana Reddy:
ST Workshop Final Report. WETICE 2007: 387-388 - 2006
- [j25]Matt Bishop, Deborah A. Frincke:
Who Owns Your Computer? IEEE Secur. Priv. 4(2): 61-63 (2006) - [j24]Matt Bishop:
Teaching context in information security. ACM J. Educ. Resour. Comput. 6(3): 3 (2006) - [c36]Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop:
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16 - [c35]Vicentiu Neagoe, Matt Bishop:
Inconsistency in deception for defense. NSPW 2006: 31-38 - [c34]Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt:
Sanitization models and their limitations. NSPW 2006: 41-56 - [c33]David P. Gilliam, Matt Bishop:
Eleventh Securities Technologies (ST) Workshop Report. WETICE 2006: 305-306 - [c32]Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt:
Some Problems in Sanitizing Network Data. WETICE 2006: 307-312 - [c31]David P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog:
Security Verification Techniques Applied to PatchLink COTS Software. WETICE 2006: 319-325 - 2005
- [j23]Matt Bishop, Deborah A. Frincke:
A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Secur. Priv. 3(4): 49-51 (2005) - [j22]Matt Bishop, Deborah A. Frincke:
Teaching Secure Programming. IEEE Secur. Priv. 3(5): 54-56 (2005) - [c30]Jingmin Zhou, Adam J. Carlson, Matt Bishop:
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. ACSAC 2005: 117-126 - [c29]Matt Bishop:
The insider problem revisited. NSPW 2005: 75-76 - [c28]Matt Bishop:
Position: "insider" is relative. NSPW 2005: 77-78 - [c27]Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo:
Principles-driven forensic analysis. NSPW 2005: 85-93 - [c26]David P. Gilliam, John D. Powell, Matt Bishop:
Application of Lightweight Formal Methods to Software Security. WETICE 2005: 160-165 - 2004
- [b1]Matt Bishop:
Introduction to Computer Security. Addison-Wesley 2004, ISBN 978-0-321-24744-5, pp. I-XXXII, 1-747 - [j21]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [j20]Matt Bishop, Deborah A. Frincke:
Teaching Robust Programming. IEEE Secur. Priv. 2(2): 54-57 (2004) - [j19]Deborah A. Frincke, Matt Bishop:
Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Secur. Priv. 2(3): 69-72 (2004) - [j18]Deborah A. Frincke, Matt Bishop:
Back to School. IEEE Secur. Priv. 2(4): 54-56 (2004) - [j17]Deborah A. Frincke, Matt Bishop:
Joining the Security Education Community. IEEE Secur. Priv. 2(5): 61-63 (2004) - [j16]Deborah A. Frincke, Matt Bishop:
Academic Degrees and Professional Certification. IEEE Secur. Priv. 2(6): 56-58 (2004) - [j15]Tom Walcott, Matt Bishop:
Traducement: A model for record security. ACM Trans. Inf. Syst. Secur. 7(4): 576-590 (2004) - [c25]Matt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt:
How to Sanitize Data. WETICE 2004: 217-222 - 2003
- [j14]Matt Bishop:
What Is Computer Security? IEEE Secur. Priv. 1(1): 67-69 (2003) - [c24]Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch:
Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. ACSAC 2003: 428-429 - [c23]Matt Bishop:
Panel: Teaching Undergraduate Information Assurance. World Conference on Information Security Education 2003: 169-171 - [c22]Eric Haugh, Matt Bishop:
Testing C Programs for Buffer Overflow Vulnerabilities. NDSS 2003 - [c21]David P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop:
Addressing Software Security and Mitigations in the Life Cycle. SEW 2003: 201 - [c20]David P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop:
Software Security Checklist for the Software Life Cycle. WETICE 2003: 243-248 - 2002
- [j13]Matt Bishop:
Trends in academic research: vulnerabilities analysis and intrusion detection. Comput. Secur. 21(7): 609-612 (2002) - [c19]David S. Peterson, Matt Bishop, Raju Pandey:
A Flexible Containment Mechanism for Executing Untrusted Code. USENIX Security Symposium 2002: 207-225 - 2001
- [c18]Matt Bishop, Anup K. Ghosh, James A. Whittaker:
How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-340 - [c17]David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop:
Development of a Software Security Assessment Instrument to Reduce Software Security Risk. WETICE 2001: 144-149 - 2000
- [j12]Brant Hashii, Scott Malabarba, Raju Pandey, Matt Bishop:
Supporting reconfigurable security policies for mobile programs. Comput. Networks 33(1-6): 77-93 (2000) - [j11]Matt Bishop:
Education in information security. IEEE Concurr. 8(4): 4-8 (2000) - [c16]Tuomas Aura, Matt Bishop, Dean Sniegowski:
Analyzing Single-Server Network Inhibition. CSFW 2000: 108-117 - [c15]John R. Hughes, Tuomas Aura, Matt Bishop:
Using Conservation of Flow as a Security Mechanism in Network Protocols. S&P 2000: 132-141 - [c14]David P. Gilliam, John C. Kelly, Matt Bishop:
Reducing Software Security Risk through an Integrated Approach. WETICE 2000: 141-146
1990 – 1999
- 1999
- [c13]Matt Bishop:
Vulnerability Analysis: An Extended Abstract. Recent Advances in Intrusion Detection 1999 - 1998
- [c12]Michael Clifford, C. Lavine, Matt Bishop:
The Solar Trust Model: Authentication Without Limitation. ACSAC 1998: 300-307 - 1997
- [j10]George Fink, Matt Bishop:
Property-based testing: a new approach to testing for assurance. ACM SIGSOFT Softw. Eng. Notes 22(4): 74-80 (1997) - 1996
- [j9]Matt Bishop, Michael Dilger:
Checking for Race Conditions in File Accesses. Comput. Syst. 9(2): 131-152 (1996) - [j8]Matt Bishop:
Conspiracy and Information Flow in the Take-Grant Protection Model. J. Comput. Secur. 4(4): 331-360 (1996) - [j7]Edward Amoroso, Matt Bishop:
Secruity Enables Electronic Commerce. J. Netw. Syst. Manag. 4(3): 247-249 (1996) - 1995
- [j6]Matt Bishop, Daniel V. Klein:
Improving system security via proactive password checking. Comput. Secur. 14(3): 233-249 (1995) - [j5]Matt Bishop:
Theft of Information in the Take-Grant Protection Model. J. Comput. Secur. 3(4): 283-308 (1995) - 1993
- [c11]Matt Bishop:
Teaching Computer Security. SEC 1993: 65-74 - 1991
- [c10]Matt Bishop:
Password management. Compcon 1991: 167-169 - [c9]Matt Bishop:
An Authentication Mechanism for USENET. USENIX Winter 1991: 281-288 - 1990
- [j4]Matt Bishop:
Collaboration using Roles. Softw. Pract. Exp. 20(5): 485-497 (1990) - [c8]Matt Bishop:
A security analysis of the NTP protocol version 2. ACSAC 1990: 20-29
1980 – 1989
- 1989
- [c7]Matt Bishop:
A model of security monitoring. ACSAC 1989: 46-52 - [c6]Matt Bishop:
Privacy-Enhanced Electronic Mail. Distributed Computing And Cryptography 1989: 93-106 - [c5]Matt Bishop:
UNIX security in a supercomputing environment. SC 1989: 693-698 - 1988
- [j3]Matt Bishop:
An Application of a Fast Data Encryption Standard Implementation. Comput. Syst. 1(3): 221-254 (1988) - [c4]Matt Bishop:
Theft of Information in the Take-Grant Protection Model. CSFW 1988: 194-218 - 1987
- [j2]Matt Bishop:
Profiling Under UNIX by Patching. Softw. Pract. Exp. 17(10): 729-739 (1987) - 1986
- [j1]Matt Bishop:
A pauper's callback scheme. Comput. Secur. 5(2): 141-144 (1986) - [c3]Matt Bishop:
Analyzing the Security of an Existing Computer System. FJCC 1986: 1115-1119 - 1981
- [c2]Matt Bishop:
Hierarchical Take-Grant Protection Systems. SOSP 1981: 109-122
1970 – 1979
- 1979
- [c1]Matt Bishop, Lawrence Snyder:
The Transfer of Information and Authority in a Protection System. SOSP 1979: 45-54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint