David M. Balenson

Orcid: 0000-0002-0913-4852

According to our database1, David M. Balenson authored at least 14 papers between 1985 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2022
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2021
Cyber Security Awareness Requirements for Operational Technology Systems.
Proceedings of the Critical Infrastructure Protection XV, 2021

2020
Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure.
Proceedings of the Critical Infrastructure Protection XIV, 2020

2019
A Comparative Analysis Approach for Deriving Failure Scenarios in the Natural Gas Distribution Infrastructure.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Cyber Risk Economics Capability Gaps Research Strategy.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2015
Government-Funded R&D to Drive Cybersecurity Technologies.
IT Prof., 2015

2013
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice.
IEEE Secur. Priv., 2013

2010
Barriers to science in security.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2000
ISAKMP Key Recovery Extension.
Comput. Secur., 2000

1996
Commercial Key Recovery.
Commun. ACM, 1996

1993
Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers.
RFC, February, 1993

1992
Security Aspects of a UNIX PEM Implementation.
Proceedings of the USENIX Summer 1992 Technical Conference, 1992

1985
Automated distribution of cryptographic keys using the financial institution key management standard.
IEEE Commun. Mag., 1985


  Loading...