James Bret Michael
Orcid: 0000-0003-3777-9858Affiliations:
- Naval Postgraduate School, Monterey, CA, USA
According to our database1,
James Bret Michael
authored at least 130 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Machine-Learned Correctness Properties, Runtime Verification, and Advance-Warning Oracles for Autonomous Systems.
Computer, October, 2024
2023
Computer, December, 2023
Computer, 2023
2022
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence.
IEEE Secur. Priv., 2022
Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors.
Computer, 2022
Lightweight Verification and Validation of Cyberphysical Systems Using Machine-Learned Correctness Properties.
Computer, 2022
Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical Systems.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022
2021
Computer, 2021
Computer, 2021
Computer, 2021
Computer, 2021
Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks.
Proceedings of the 2021 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2021
2020
Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures.
Computer, 2020
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020
2019
Computer, 2019
2015
2014
IEEE Trans. Software Eng., 2014
2013
End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software.
IEEE Syst. J., 2013
2012
Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, 2012
2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Putting order into the cloud: Object-oriented UML-based enforcement for document and application organization.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Formal validation and verification of space flight software using statechart-assertions and runtime execution monitoring.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Cloud Computing Support for Collaboration and Communication in Enterprise-Wide Workflow Processes.
Proceedings of the World Congress on Services, 2011
2010
Hazard Analysis and Validation Metrics Framework for System of Systems Software Safety.
IEEE Syst. J., 2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
2009
Architectural Patterns and Auto-Fusion Process for Automated Multisensor Fusion in SOA System-of-Systems.
IEEE Syst. J., 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Standards interoperability: Applying software safety assurance standards to the evolution of legacy software.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Approaches for Measuring Software Project Management Effectiveness.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009
2008
IEEE Syst. J., 2008
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
Multistage security for hybrid, large-scale, mobile wireless sensor networks for missile defense.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008
Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008
2007
A Distributed Medium Access Control Protocol for Wireless Networks of Cooperative Radar Systems.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007
Proceedings of the 5th International Workshop on Java Technologies for Real-time and Embedded Systems, 2007
2006
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks.
Internet Res., 2006
Environment behavior models for automation of testing and assessment of system safety.
Inf. Softw. Technol., 2006
Proceedings of the 1st IEEE/SMC International Conference on System of Systems Engineering, 2006
Implementation and analysis of environment behavior models as a tool for testing real-time, reactive systems.
Proceedings of the 1st IEEE/SMC International Conference on System of Systems Engineering, 2006
2005
ACM SIGSOFT Softw. Eng. Notes, 2005
J. Intell. Transp. Syst., 2005
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the IEEE International Conference on Systems, 2005
Using attributed event grammar environment models for automated test generation and software risk assessment of system-of-systems.
Proceedings of the IEEE International Conference on Systems, 2005
Proceedings of the 16th IEEE International Workshop on Rapid System Prototyping (RSP 2005), 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the Advances in Digital Forensics, 2005
2004
Modeling and Simulation of System-of-Systems Timing Constraints with UML-RT and OMNeT++.
Proceedings of the 15th IEEE International Workshop on Rapid System Prototyping (RSP 2004), 2004
Proceedings of the Intelligence and Security Informatics, 2004
2003
Lawful Cyber Decoy Policy.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
An Experiment in Software Decoy Design.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Experiments with Deceptive Software Responses to Buffer-Based Attacks.
Proceedings of the IEEE Systems, 2003
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2002
Proceedings of the Radical Innovations of Software and Systems Engineering in the Future, 2002
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002
Proceedings of the 4th International Conference on Collaborative Virtual Environments 2002, Bonn, Germany, September 30, 2002
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Proceedings of the 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, 2001
2000
Proceedings of the Data and Application Security, 2000
1999
Secure group management in large distributed systems: what is a group and what does it do?
Proceedings of the 1999 Workshop on New Security Paradigms, 1999
1998
J. Intell. Transp. Syst., 1998
1993
Proceedings of IEEE International Symposium on Requirements Engineering, 1993
Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
1992
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation.
Proceedings of the Database Security, 1992
1991
Use of an Experimental Policy Workbench: Description and Preliminary Results.
Proceedings of the Database Security, 1991