default search action
James Bret Michael
J. Bret Michael – Bret Michael 0001
Person information
- affiliation: Naval Postgraduate School, Monterey, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j70]Michael T. Swearingen, James Bret Michael, Joseph Weiss, Robert Radvanovsky:
Resilient Without Zero Trust. Computer 57(1): 120-122 (2024) - [j69]Andreas Grünert, James Bret Michael, Rolf Oppliger, Ruedi Rytz:
Why Probabilities Cannot Be Used in Cyber Risk Management. Computer 57(10): 86-89 (2024) - [j68]Matthew Litton, Doron Drusinsky, London Bridget, James Bret Michael:
Machine-Learned Correctness Properties, Runtime Verification, and Advance-Warning Oracles for Autonomous Systems. Computer 57(10): 118-130 (2024) - [i1]Matthew Litton, Doron Drusinsky, James Bret Michael:
Discovering Decision Manifolds to Assure Trusted Autonomous Systems. CoRR abs/2402.07791 (2024) - 2023
- [j67]Qinghua Lu, Liming Zhu, Jon Whittle, James Bret Michael:
Software Engineering for Responsible AI. Computer 56(4): 13-16 (2023) - [j66]Thomas C. Wingfield, James Bret Michael:
Waterfall: Cascading Effects of a Strategic Cyber Campaign. Computer 56(4): 143-148 (2023) - [j65]Doron Drusinsky, Matthew Litton, James Bret Michael:
Machine-Learned Verification and Advance Notice Oracles for Autonomous Systems. Computer 56(7): 121-130 (2023) - [j64]Joseph Weiss, James Bret Michael, Michael T. Swearingen:
There Is No Chilling When Your Control System Cybersecurity Is Unfulfilling. Computer 56(12): 120-124 (2023) - 2022
- [j63]Doron Drusinsky, Matthew Litton, James Bret Michael:
Lightweight Verification and Validation of Cyberphysical Systems Using Machine-Learned Correctness Properties. Computer 55(2): 102-108 (2022) - [j62]James Bret Michael, Marko Orescanin:
Developing and Deploying Artificial Intelligence Systems. Computer 55(6): 15-17 (2022) - [j61]James Bret Michael:
Placing Trust in Automated Software Development Processes. Computer 55(7): 78-81 (2022) - [j60]James Bret Michael, George W. Dinolt, Frederick B. Cohen, Duminda Wijesekera:
Can You Trust Zero Trust? Computer 55(8): 103-105 (2022) - [j59]James Bret Michael:
Understanding Conversational Artificial Intelligence. Computer 55(9): 115-119 (2022) - [j58]Joseph Weiss, Michael Hood, Nadine Miller, Chris Potorieko, James Bret Michael:
Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors. Computer 55(11): 106-111 (2022) - [j57]James Bret Michael:
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence. IEEE Secur. Priv. 20(5): 4-6 (2022) - [c61]Doron Drusinsky, James Bret Michael, Matthew Litton:
Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical Systems. ISSRE Workshops 2022: 333-341 - 2021
- [j56]Richard D. Riehle, James Bret Michael:
Improving the Trustworthiness of Software Through Rigorous Data Type Design. Computer 54(1): 89-95 (2021) - [j55]Matthew Lanoue, Chad A. Bollmann, James Bret Michael, John D. Roth, Duminda Wijesekera:
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities. Computer 54(4): 76-84 (2021) - [j54]Joanna F. DeFranco, Christopher S. Eagle, James Bret Michael, John Viega, Jeffrey M. Voas:
Hackathons 101. Computer 54(5): 65-69 (2021) - [j53]Joshua A. Kroll, James Bret Michael, David B. Thaw:
Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks. Computer 54(6): 64-71 (2021) - [j52]John Viega, James Bret Michael:
Struggling With Supply-Chain Security. Computer 54(7): 98-104 (2021) - [j51]Doron Drusinsky, James Bret Michael:
Multiagent Pathfinding Under Rigid, Optimization, and Uncertainty Constraints. Computer 54(7): 111-118 (2021) - [j50]James Bret Michael, Doron Drusinsky, Duminda Wijesekera:
Formal Verification of Cyberphysical Systems. Computer 54(9): 15-24 (2021) - [j49]James Bret Michael, Doron Drusinsky, Duminda Wijesekera:
Formal Methods in Cyberphysical Systems. Computer 54(9): 25-29 (2021) - [j48]James Bret Michael, Thomas C. Wingfield:
Defensive AI: The Future Is Yesterday. Computer 54(9): 90-96 (2021) - [j47]James Bret Michael:
Trusting Human-Machine Teaming. Computer 54(11): 104-107 (2021) - [j46]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j45]James Bret Michael:
Security and Privacy for Edge Artificial Intelligence. IEEE Secur. Priv. 19(4): 4-7 (2021) - [j44]Thomas Carter, Joshua A. Kroll, James Bret Michael:
Lessons Learned From Applying the NIST Privacy Framework. IT Prof. 23(4): 9-13 (2021) - [c60]Matthew Lanoue, James Bret Michael, Chad A. Bollmann:
Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks. SPECTS 2021: 1-8 - 2020
- [j43]Loren E. Peitso, James Bret Michael:
The Promise of Interactive Shared Augmented Reality. Computer 53(1): 45-52 (2020) - [j42]Doron Drusinsky, James Bret Michael:
Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures. Computer 53(4): 51-56 (2020) - [j41]James Bret Michael, George W. Dinolt, Doron Drusinsky:
Open Questions in Formal Methods. Computer 53(5): 81-84 (2020) - [j40]James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas:
Cyberthreats in 2025. Computer 53(6): 16-27 (2020) - [j39]James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas:
Security or Privacy: Can You Have Both? Computer 53(9): 20-30 (2020) - [j38]James Bret Michael, Jeffrey M. Voas:
Algorithms, Algorithms, Algorithms. Computer 53(11): 13-15 (2020) - [j37]James Bret Michael:
Practical Aspects of Employing Antireverse Engineering. IT Prof. 22(3): 11-13 (2020) - [c59]Nathan Thiem, Marko Orescanin, James Bret Michael:
Reducing Artifacts in GAN Audio Synthesis. ICMLA 2020: 1268-1275
2010 – 2019
- 2019
- [j36]John D. Roth, Corey E. Lutton, James Bret Michael:
Security Through Simplicity: A Case Study in Logical Segmentation Inference. Computer 52(7): 76-79 (2019) - [j35]James Bret Michael:
Assessing the Trustworthiness of Electronic Systems. Computer 52(11): 80-83 (2019) - [j34]James Bret Michael:
Trustworthiness of Autonomous Machines in Armed Conflict. IEEE Secur. Priv. 17(6): 4-6 (2019) - 2015
- [j33]James Bret Michael:
Trusted Computing: An Elusive Goal. Computer 48(3): 99-101 (2015) - 2014
- [j32]Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera:
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes. IEEE Trans. Software Eng. 40(2): 154-166 (2014) - 2013
- [j31]James Bret Michael:
Empowering Users through Secure On-Demand Data Provisioning. Computer 46(6): 84-85 (2013) - [j30]James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas:
Does Security Trump Reliability? Computer 46(11): 84-86 (2013) - [j29]Miriam C. Bergue Alves, Doron Drusinsky, James Bret Michael, Man-tak Shing:
End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software. IEEE Syst. J. 7(4): 632-641 (2013) - 2012
- [j28]Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael:
Securing the ZigBee Protocol in the Smart Grid. Computer 45(4): 92-94 (2012) - [j27]William H. Boothby, Wolff Heintschel von Heinegg, James Bret Michael, Michael N. Schmitt, Thomas C. Wingfield:
When Is a Cyberattack a Use of Force or an Armed Attack? Computer 45(8): 82-84 (2012) - [j26]Arnold Brown, Benjamin Apple, James Bret Michael, Michael A. Schumann:
Atomic-Level Security for Web Applications in a Cloud Environment. Computer 45(12): 80-83 (2012) - [j25]Jeffrey M. Voas, J. Bret Michael, Michiel van Genuchten:
The Mobile Software App Takeover. IEEE Softw. 29(4): 25-27 (2012) - [c58]Mohammad Ababneh, Duminda Wijesekera, James Bret Michael:
A Policy-Based Dialogue System for Physical Access Control. STIDS 2012: 57-63 - 2011
- [j24]Jeffrey M. Voas, George F. Hurlburt, Keith W. Miller, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. IT Prof. 13(2): 6-9 (2011) - [j23]T. Owens Walker III, Murali Tummala, John C. McEachen, J. Bret Michael:
Flow-Specific Medium Access for Networked Satellite System. IEEE Syst. J. 5(3): 427-434 (2011) - [j22]James Bret Michael, Doron Drusinsky, Thomas W. Otani, Man-tak Shing:
Verification and Validation for Trustworthy Software Systems. IEEE Softw. 28(6): 86-92 (2011) - [c57]Jason S. Bolin, James Bret Michael, Man-tak Shing:
Cloud Computing Support for Collaboration and Communication in Enterprise-Wide Workflow Processes. SERVICES 2011: 589-593 - [c56]Doron Drusinsky, J. Bret Michael, Man-tak Shing:
Rapid runtime system verification using automatic source code instrumentation. SoSE 2011: 1-6 - [c55]Doron Drusinsky, J. Bret Michael, Thomas W. Otani, Man-tak Shing:
Putting order into the cloud: Object-oriented UML-based enforcement for document and application organization. SoSE 2011: 119-124 - [c54]Miriam C. Bergue Alves, Doron Drusinsky, J. Bret Michael, Man-tak Shing:
Formal validation and verification of space flight software using statechart-assertions and runtime execution monitoring. SoSE 2011: 155-160 - [c53]Alex J. Nelson, George W. Dinolt, J. Bret Michael, Man-tak Shing:
A security and usability perspective of cloud file systems. SoSE 2011: 161-166 - [c52]Scott Dowell, Albert Barreto, J. Bret Michael, Man-tak Shing:
Cloud to cloud interoperability. SoSE 2011: 258-263 - 2010
- [j21]James Bret Michael, John F. Sarkesain, Thomas C. Wingfield, Georgios Dementis, Goncalo Nuno Baptista Sousa:
Integrating Legal and Policy Factors in Cyberpreparedness. Computer 43(4): 90-92 (2010) - [j20]James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield:
From Chaos to Collective Defense. Computer 43(8): 91-94 (2010) - [j19]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller, Phillip A. Laplante, Bret Michael:
A Nonlinear Perspective on Higher Education. Computer 43(12): 90-92 (2010) - [j18]John Viega, Bret Michael:
Guest Editors' Introduction: Mobile Device Security. IEEE Secur. Priv. 8(2): 11-12 (2010) - [j17]Bret Michael:
Balancing Liberty, Stability, and Security. IEEE Secur. Priv. 8(3): 3 (2010) - [j16]James Bret Michael, Man-tak Shing, Kristian John Cruickshank, Patrick J. Redmond:
Hazard Analysis and Validation Metrics Framework for System of Systems Software Safety. IEEE Syst. J. 4(2): 186-197 (2010) - [c51]Kevin D. Foster, John J. Shea, James Bret Michael, Thomas W. Otani, Loren E. Peitso, Man-tak Shing:
Cloud Computing for Large-Scale Weapon Systems. GrC 2010: 161-166 - [c50]Kevin D. Foster, John J. Shea, Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-tak Shing:
Removing the Boundaries: Steps Toward a Cloud Nirvana. GrC 2010: 167-171 - [c49]Stephen B. Driskell, Judy Murphy, James Bret Michael, Man-tak Shing:
Independent validation of software safety requirements for systems of systems. SoSE 2010: 1-6 - [c48]Thomas W. Otani, James Bret Michael, Man-tak Shing:
Goal-driven software reuse in the IV&V of system of systems. SoSE 2010: 1-6
2000 – 2009
- 2009
- [j15]Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica:
Cube-Type Algebraic Attacks on Wireless Encryption Protocols. Computer 42(10): 103-105 (2009) - [j14]Alexander J. Beecroft, James Bret Michael:
Passive Fingerprinting of Network Reconnaissance Tools. Computer 42(11): 91-93 (2009) - [j13]Bret Michael, Jeffrey M. Voas, Phillip A. Laplante:
Cyberpandemics: History, Inevitability, Response. IEEE Secur. Priv. 7(1): 63-67 (2009) - [j12]Bret Michael:
In Clouds Shall We Trust? IEEE Secur. Priv. 7(5): 3 (2009) - [j11]K. J. Rothenhaus, James Bret Michael, Man-tak Shing:
Architectural Patterns and Auto-Fusion Process for Automated Multisensor Fusion in SOA System-of-Systems. IEEE Syst. J. 3(3): 304-316 (2009) - [c47]Kadir Alpaslan Demir, James Bret Michael, John S. Osmundson:
Approaches for Measuring Software Project Management Effectiveness. Software Engineering Research and Practice 2009: 613-619 - [c46]Randall J. Arvay, Duminda Wijesekera, James Bret Michael:
Using RuleML to specify cross-domain information flow control policies. SoSE 2009: 1-6 - [c45]Kristian John Cruickshank, James Bret Michael, Man-tak Shing:
A Validation Metrics Framework for safety-critical software-intensive Systems. SoSE 2009: 1-8 - [c44]Desmond J. Meacham, James Bret Michael, Man-tak Shing, Jeffrey M. Voas:
Standards interoperability: Applying software safety assurance standards to the evolution of legacy software. SoSE 2009: 1-8 - [c43]James Bret Michael, Richard D. Riehle, Man-tak Shing:
The verification and validation of software architecture for systems of systems. SoSE 2009: 1-6 - [c42]Thomas W. Otani, James Bret Michael, Man-tak Shing:
Software reuse in the IV&V of system of systems. SoSE 2009: 1-5 - [c41]Michael A. Schumann, James Bret Michael:
Statechart based formal modeling of workflow processes. SoSE 2009: 1-5 - [c40]T. Owens Walker III, Murali Tummala, John C. McEachen, J. Bret Michael:
Medium access for hybrid, large-scale wireless networks for missile defense. SoSE 2009: 1-5 - 2008
- [j10]Bret Michael:
Are Governments Up to the Task? IEEE Secur. Priv. 6(6): 4-5 (2008) - [j9]Doron Drusinsky, James Bret Michael, Man-tak Shing:
A framework for computer-aided validation. Innov. Syst. Softw. Eng. 4(2): 161-168 (2008) - [j8]Doron Drusinsky, James Bret Michael, Man-tak Shing:
A Visual Tradeoff Space for Formal Verification and Validation Techniques. IEEE Syst. J. 2(4): 513-519 (2008) - [c39]Clifford C. Juan, James Bret Michael, Christopher S. Eagle:
Vulnerability Analysis of HD Photo Image Viewer Applications. SSIRI 2008: 1-7 - [c38]Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-tak Shing:
Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance. SSIRI 2008: 47-51 - [c37]Doron Drusinsky, James Bret Michael, Thomas W. Otani, Man-tak Shing:
Integrating statechart assertions into Java components using AspectJ. SoSE 2008: 1-7 - [c36]Grigorios Katsis, T. Owens Walker III, Panagiotis Katopodis, Murali Tummala, J. Bret Michael:
Multistage security for hybrid, large-scale, mobile wireless sensor networks for missile defense. SoSE 2008: 1-6 - [c35]Patrick J. Redmond, J. Bret Michael, Paul V. Shebalin:
Interface hazard analysis for system of systems. SoSE 2008: 1-8 - [c34]Bradley Warren, James Bret Michael, Man-tak Shing:
A framework for software reuse in safety-critical system-of-systems. SoSE 2008: 1-6 - 2007
- [c33]Thomas W. Otani, Mikhail Auguston, Thomas S. Cook, Doron Drusinsky, James Bret Michael, Man-tak Shing:
A design pattern for using non-developmental items in real-time Java. JTRES 2007: 135-143 - [c32]Panagiotis Katopodis, Grigorios Katsis, T. Owens Walker III, Murali Tummala, J. Bret Michael:
A Hybrid, Large-scale Wireless Sensor Network for Missile Defense. SoSE 2007: 1-5 - [c31]B. Rakdham, Murali Tummala, Phillip E. Pace, J. Bret Michael, Z. P. Pace:
Boost Phase Ballistic Missile Defense Using Multiple Hypothesis Tracking. SoSE 2007: 1-6 - [c30]T. Owens Walker III, Murali Tummala, J. Bret Michael:
A Distributed Medium Access Control Protocol for Wireless Networks of Cooperative Radar Systems. SoSE 2007: 1-6 - 2006
- [j7]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Environment behavior models for automation of testing and assessment of system safety. Inf. Softw. Technol. 48(10): 971-980 (2006) - [j6]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Res. 16(5): 475-490 (2006) - [c29]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 - [c28]Harsha Tummala, Mikhail Auguston, James Bret Michael, Man-tak Shing, David Little, Zachary Pace:
Implementation and analysis of environment behavior models as a tool for testing real-time, reactive systems. SoSE 2006: 1-5 - [c27]Thaddeus Owens Walker III, Murali Tummala, James Bret Michael:
Pulse transmission scheduling for a distributed system of cooperative radars. SoSE 2006: 1-6 - 2005
- [j5]James Bret Michael, Steven E. Roberts, Jeffrey M. Voas, Thomas C. Wingfield:
The Role of Policy in Balancing Outsourcing and Homeland Security. IT Prof. 7(4): 19-23 (2005) - [j4]Naren Kodali, Duminda Wijesekera, James Bret Michael:
SPUTERS: An Integrated Traffic Surveillance and Emergency Response Architecture. J. Intell. Transp. Syst. 9(1): 11-22 (2005) - [j3]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Environment behavior models for scenario generation and testing automation. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-6 (2005) - [c26]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Environment behavior models for scenario generation and testing automation. A-MOST 2005 - [c25]Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael:
Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294 - [c24]Duminda Wijesekera, James Bret Michael, Anil Nerode:
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118 - [c23]Mikhail Auguston, James Bret Michael, Man-tak Shing:
Test Automation and Safety Assessment in Rapid Systems Prototyping. IEEE International Workshop on Rapid System Prototyping 2005: 188-194 - [c22]Dale Scott Caffall, James Bret Michael:
Formal methods in a system-of-systems development. SMC 2005: 1856-1863 - [c21]Mikhail Auguston, James Bret Michael, Man-tak Shing, David L. Floodeen:
Using attributed event grammar environment models for automated test generation and software risk assessment of system-of-systems. SMC 2005: 1870-1875 - [c20]Dale Scott Caffall, James Bret Michael:
Architectural framework for a system-of-systems. SMC 2005: 1876-1881 - 2004
- [c19]Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 - [c18]James Bret Michael, Man-tak Shing, Michael H. Miklaski, Joel D. Babbitt:
Modeling and Simulation of System-of-Systems Timing Constraints with UML-RT and OMNeT++. IEEE International Workshop on Rapid System Prototyping 2004: 202-209 - 2003
- [j2]John S. Osmundson, James Bret Michael, Martin J. Machniak, Mary A. Grossman:
Quality management metrics for software development. Inf. Manag. 40(8): 799-812 (2003) - [c17]James Bret Michael, Thomas C. Wingfield, Steven E. Roberts:
Homeland Security's Cyber Component: A Survey of Legal Issues. COMPSAC 2003: 24- - [c16]