Cynthia E. Irvine
According to our database1,
Cynthia E. Irvine
authored at least 85 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Verification of a Distributed Ledger Protocol for Distributed Autonomous Systems Using Monterey Phoenix.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2021
Labtainers Cyber Exercises: Building and Deploying Fully Provisioned Cyber Labs that Run on a Laptop.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021
2020
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces, 2020
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020
2019
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019
2018
2017
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
2015
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
2014
Proceedings of the 2014 USENIX Summit on Gaming, 2014
2013
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
2012
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
IEEE Secur. Priv., 2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the HOST 2011, 2011
2010
ACM Trans. Reconfigurable Technol. Syst., 2010
Proceedings of the 5th Workshop on Embedded Systems Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
Proceedings of the Trusted Computing, 2009
Proceedings of the Engineering Secure Software and Systems, 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
2008
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 44th Design Automation Conference, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
A flexible multi-dimensional QoS performance measure framework for distributed heterogeneous systems.
Clust. Comput., 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006
Using Common Criteria Methodology to Express Informal Security Requirements.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
Proceedings of the E-Business and Telecommunication Networks, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
2005
Proceedings of the Computer Network Security, 2005
2004
A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach.
Proceedings of the Information Security Management, Education and Privacy, 2004
2003
A Program for Education in Certification and Accreditation.
Proceedings of the Security Education and Critical Infrastructures, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Requir. Eng., 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
2001
A cautionary note regarding the data integrity capacity of certain secure systems.
Proceedings of the Integrity, 2001
Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the 3rd Annual International Workshop on Active Middleware Services (AMS 2001), 2001
2000
Proceedings of the 9th USENIX Security Symposium, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
Proceedings of the 9th Heterogeneous Computing Workshop, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the 8th Heterogeneous Computing Workshop, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989