Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Matt Bishop
2010 – today
- 2013
[j44]Sean Whalen, Sean Peisert, Matt Bishop: Multiclass classification of distributed memory parallel computations. Pattern Recognition Letters 34(3): 322-329 (2013)
[c68]Kara L. Nance, Matt Bishop, Amelia Phillips: Introduction to Digital Forensics - Education, Research, and Practice Minitrack. HICSS 2013: 4879
[c67]Helen Armstrong, Matt Bishop, Colin J. Armstrong: Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders. World Conference on Information Security Education 2013: 11-19
[c66]Blair Taylor, Matt Bishop, Elizabeth K. Hawthorne, Kara L. Nance: Teaching secure coding: the myths and the realities. SIGCSE 2013: 281-282
[c65]Matt Bishop, Blair Taylor, Elizabeth K. Hawthorne, Diana Burley, Siddharth Kaza: Introducing secure coding in CS0 and CS1 (abstract only). SIGCSE 2013: 761- 2012
[j43]
[j42]Sean Whalen, Sophie Engle, Sean Peisert, Matt Bishop: Network-theoretic classification of parallel computation patterns. IJHPCA 26(2): 159-169 (2012)
[j41]Matt Bishop, Sophie Engle, Damien Howard, Sean Whalen: A Taxonomy of Buffer Overflow Characteristics. IEEE Trans. Dependable Sec. Comput. 9(3): 305-317 (2012)
[c64]Brian Hay, Kara L. Nance, Matt Bishop, Lucas McDaniel: Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud. HICSS 2012: 5473-5479
[c63]Sean Peisert, Edward B. Talbot, Matt Bishop: Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems. NSPW 2012: 15-26
[c62]Blair Taylor, Matt Bishop, Diana Burley, Steve Cooper, Ronald C. Dodge, Robert Seacord: Teaching secure coding: report from summit on education in secure software. SIGCSE 2012: 581-582- 2011
[j40]
[c61]
[c60]Brian Hay, Kara L. Nance, Matt Bishop: Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. HICSS 2011: 1-7
[c59]Matt Bishop, Chip Elliott: Robust Programming by Example. World Conference on Information Security Education 2011: 140-147
[c58]Matt Bishop, Kara L. Nance: The Strengths and Challenges of Analogical Approaches to Computer Security Education. World Conference on Information Security Education 2011: 211-217
[c57]
[c56]
[c55]Matt Bishop, Marco Carvalho, Richard Ford, Liam M. Mayron: Resilience is more than availability. NSPW 2011: 95-104
[c54]Michael Clifford, Matt Bishop: Trust of medical devices, applications, and users in pervasive healthcare. PETRA 2011: 54- 2010
[j39]
[j38]Edward B. Talbot, Deborah A. Frincke, Matt Bishop: Demythifying Cybersecurity. IEEE Security & Privacy 8(3): 56-59 (2010)
[j37]
[c53]
[c52]Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana, Deborah A. Agarwal, Deborah A. Frincke, Michael Hogarth: Relationships and data sanitization: a study in scarlet. NSPW 2010: 151-164
[c51]Carrie Gates, Matt Bishop: The security and privacy implications of using social networks to deliver healthcare. PETRA 2010
[c50]Sean Whalen, Matt Bishop, James P. Crutchfield: Hidden Markov Models for Automated Protocol Learning. SecureComm 2010: 415-428
[c49]Peter G. Neumann, Matt Bishop, Sean Peisert, Marv Schaefer: Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. IEEE Symposium on Security and Privacy 2010: 3-13
[p2]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop: Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15
[p1]Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen: A Risk Management Approach to the "Insider Threat". Insider Threats in Cyber Security 2010: 115-137
[e2]Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (Eds.): Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6
2000 – 2009
- 2009
[j36]Brian Hay, Matt Bishop, Kara L. Nance: Live Analysis: Progress and Challenges. IEEE Security & Privacy 7(2): 30-37 (2009)
[j35]Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno: Are Patched Machines Really Fixed? IEEE Security & Privacy 7(5): 82-85 (2009)
[j34]Stephen Cooper, Christine Nickell, Victor P. Piotrowski Jr., Brenda Oldfield, Ali Abdallah, Matt Bishop, Bill Caelli, Melissa Dark, Elizabeth K. Hawthorne, Lance J. Hoffman, Lance C. Pérez, Charles Pfleeger, Richard A. Raines, Corey D. Schou, Joel Brynielsson: An exploration of the current state of information assurance education. SIGCSE Bulletin 41(4): 109-125 (2009)
[c48]Kara L. Nance, Brian Hay, Matt Bishop: Investigating the Implications of Virtual Machine Introspection for Digital Forensics. ARES 2009: 1024-1029
[c47]
[c46]Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates: Case Studies of an Insider Framework. HICSS 2009: 1-10
[c45]Kara L. Nance, Brian Hay, Matt Bishop: Digital Forensics: Defining a Research Agenda. HICSS 2009: 1-6
[c44]Sean Peisert, Matt Bishop, Alec Yasinsac: Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10
[c43]Matt Bishop: Some "Secure Programming" Exercises for an Introductory Programming Class. World Conference on Information Security Education 2009: 226-232
[c42]Matt Bishop, Carrie Gates, Jeffrey Hunker: The sisterhood of the traveling packets. NSPW 2009: 59-70
[c41]Sean Peisert, Matt Bishop, Laura Corriss, Steven J. Greenwald: Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal. NSPW 2009: 71-84
[c40]Bhume Bhumiratana, Matt Bishop: Privacy aware data sharing: balancing the usability and privacy of datasets. PETRA 2009
[c39]Zhengyi Le, Matt Bishop, Fillia Makedon: Strong mobile device protection from loss and capture. PETRA 2009- 2008
[j33]Alec Yasinsac, Matt Bishop: The Dynamics of Counting and Recounting Votes. IEEE Security & Privacy 6(3): 22-29 (2008)
[j32]Kara L. Nance, Matt Bishop, Brian Hay: Virtual Machine Introspection: Observation or Interference? IEEE Security & Privacy 6(5): 32-37 (2008)
[j31]Matt Bishop, Deborah A. Frincke: Information Assurance Education: A Work In Progress. IEEE Security & Privacy 6(5): 54-57 (2008)
[c38]
[c37]Matt Bishop, Sophie Engle, Sean Peisert, Sean Whalen, Carrie Gates: We have met the enemy and he is us. NSPW 2008: 1-12
[c36]
[c35]David P. Gilliam, Matt Bishop: Twelfth Securities Technologies (ST) Workshop Report. WETICE 2008: 255-256
[e1]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji (Eds.): Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9- 2007
[j30]Earl T. Barr, Matt Bishop, Mark Gondree: Fixing federal e-voting standards. Commun. ACM 50(3): 19-24 (2007)
[j29]
[j28]Matt Bishop, Deborah A. Frincke: Achieving Learning Objectives through E-Voting Case Studies. IEEE Security & Privacy 5(1): 53-56 (2007)
[j27]Sean Peisert, Matt Bishop: I Am a Scientist, Not a Philosopher! IEEE Security & Privacy 5(4): 48-51 (2007)
[j26]
[j25]Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo: Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Trans. Dependable Sec. Comput. 4(2): 137-150 (2007)
[j24]Jingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop: Modeling network intrusion detection alerts for correlation. ACM Trans. Inf. Syst. Secur. 10(1) (2007)
[c34]Matt Bishop: E-Voting as a Teaching Tool. World Conference on Information Security Education 2007: 17-24
[c33]Sean Peisert, Matt Bishop: How to Design Computer Security Experiments. World Conference on Information Security Education 2007: 141-148
[c32]Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop: Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. RAID 2007: 127-145
[c31]Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo: Toward Models for Forensic Analysis. SADFE 2007: 3-15
[c30]- 2006
[j23]
[j22]Matt Bishop: Teaching context in information security. ACM Journal of Educational Resources in Computing 6(3) (2006)
[c29]Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop: Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16
[c28]
[c27]Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Sanitization models and their limitations. NSPW 2006: 41-56
[c26]David P. Gilliam, Matt Bishop: Eleventh Securities Technologies (ST) Workshop Report. WETICE 2006: 305-306
[c25]Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Some Problems in Sanitizing Network Data. WETICE 2006: 307-312
[c24]David P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog: Security Verification Techniques Applied to PatchLink COTS Software. WETICE 2006: 319-325- 2005
[j21]Matt Bishop, Deborah A. Frincke: A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Security & Privacy 3(4): 49-51 (2005)
[j20]Matt Bishop, Deborah A. Frincke: Teaching Secure Programming. IEEE Security & Privacy 3(5): 54-56 (2005)
[c23]Jingmin Zhou, Adam J. Carlson, Matt Bishop: Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. ACSAC 2005: 117-126
[c22]David P. Gilliam, John D. Powell, Matt Bishop: Application of Lightweight Formal Methods to Software Security. WETICE 2005: 160-165- 2004
[j19]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
[j18]Matt Bishop, Deborah A. Frincke: Teaching Robust Programming. IEEE Security & Privacy 2(2): 54-57 (2004)
[j17]Deborah A. Frincke, Matt Bishop: Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Security & Privacy 2(3): 69-72 (2004)
[j16]
[j15]Deborah A. Frincke, Matt Bishop: Joining the Security Education Community. IEEE Security & Privacy 2(5): 61-63 (2004)
[j14]Deborah A. Frincke, Matt Bishop: Academic Degrees and Professional Certification. IEEE Security & Privacy 2(6): 56-58 (2004)
[j13]Tom Walcott, Matt Bishop: Traducement: A model for record security. ACM Trans. Inf. Syst. Secur. 7(4): 576-590 (2004)
[c21]Matt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt: How to Sanitize Data. WETICE 2004: 217-222- 2003
[j12]
[c20]Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch: Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. ACSAC 2003: 428-429
[c19]Matt Bishop: Panel: Teaching Undergraduate Information Assurance. World Conference on Information Security Education 2003: 169-171
[c18]
[c17]David P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop: Addressing Software Security and Mitigations in the Life Cycle. SEW 2003: 201
[c16]David P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop: Software Security Checklist for the Software Life Cycle. WETICE 2003: 243-248- 2002
[j11]Matt Bishop: Trends in academic research: vulnerabilities analysis and intrusion detection. Computers & Security 21(7): 609-612 (2002)
[c15]David S. Peterson, Matt Bishop, Raju Pandey: A Flexible Containment Mechanism for Executing Untrusted Code. USENIX Security Symposium 2002: 207-225- 2001
[c14]Matt Bishop, Anup K. Ghosh, James A. Whittaker: How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-340
[c13]David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop: Development of a Software Security Assessment Instrument to Reduce Software Security Risk. WETICE 2001: 144-149- 2000
[j10]Brant Hashii, Scott Malabarba, Raju Pandey, Matt Bishop: Supporting reconfigurable security policies for mobile programs. Computer Networks 33(1-6): 77-93 (2000)
[j9]
[c12]Tuomas Aura, Matt Bishop, Dean Sniegowski: Analyzing Single-Server Network Inhibition. CSFW 2000: 108-117
[c11]John R. Hughes, Tuomas Aura, Matt Bishop: Using Conservation of Flow as a Security Mechanism in Network Protocols. IEEE Symposium on Security and Privacy 2000: 132-141
[c10]David P. Gilliam, John C. Kelly, Matt Bishop: Reducing Software Security Risk through an Integrated Approach. WETICE 2000: 141-146
1990 – 1999
- 1999
[c9]Matt Bishop: Vulnerability Analysis: An Extended Abstract. Recent Advances in Intrusion Detection 1999- 1998
[c8]Michael Clifford, C. Lavine, Matt Bishop: The Solar Trust Model: Authentication Without Limitation. ACSAC 1998: 300-307- 1996
[j8]Matt Bishop, Michael Dilger: Checking for Race Conditions in File Accesses. Computing Systems 2(2): 131-152 (1996)
[j7]Matt Bishop: Conspiracy and Information Flow in the Take-Grant Protection Model. Journal of Computer Security 4(4): 331-360 (1996)
[j6]Edward Amoroso, Matt Bishop: Secruity Enables Electronic Commerce. J. Network Syst. Manage. 4(3): 247-249 (1996)- 1995
[j5]Matt Bishop, Daniel V. Klein: Improving system security via proactive password checking. Computers & Security 14(3): 233-249 (1995)
[j4]Matt Bishop: Theft of Information in the Take-Grant Protection Model. Journal of Computer Security 3(4): 283-308 (1995)- 1993
[c7]- 1991
[c6]- 1990
[j3]
1980 – 1989
- 1989
[c5]- 1988
[j2]Matt Bishop: An Application of a Fast Data Encryption Standard Implementation. Computing Systems 1(3): 221-254 (1988)
[c4]- 1987
[j1]- 1986
[c3]- 1981
[c2]
1970 – 1979
- 1979
[c1]Matt Bishop, Lawrence Snyder: The Transfer of Information and Authority in a Protection System. SOSP 1979: 45-54
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:07 CEST by the dblp team



