Jim Alves-Foss
Orcid: 0000-0002-5125-1470
According to our database1,
Jim Alves-Foss
authored at least 80 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Real-Time Operating Systems' Compliance With MISRA-C Coding Standard: A Comprehensive Study.
IEEE Access, 2024
2023
Is Formal Verification of seL4 Adequate to Address the Key Security Challenges of Kernel Design?
IEEE Access, 2023
Calibrating Cybersecurity Experiments: Evaluating Coverage Analysis for Fuzzing Benchmarks.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023
2022
A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure.
IEEE Access, 2022
2019
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
IEEE Secur. Priv., 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the NASA Formal Methods, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
An Experimental Study to Explore Attacker Response to Changes in Security and Reward.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
Detecting Compromised Nodes in a Wireless Sensor Network using Trust.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009
2008
Security policy refinement and enforcement for the design of multi-level secure systems.
J. Comput. Secur., 2008
Int. J. Inf. Comput. Secur., 2008
2007
A communication-computation efficient group key algorithm for large and dynamic groups.
Comput. Networks, 2007
Validating A Layered Decision Framework for Cost-Effective Network Defense.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
IEEE Trans. Software Eng., 2006
Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems.
J. High Speed Networks, 2006
Int. J. Embed. Syst., 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the LCN 2006, 2006
Using SPARK-Ada to Model and Verify a MILS Message Router.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
Applying the layered decision model to the design of language-based security systems.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
An MSLS-EMM for enforcing confidentiality in malicious environments.
Proceedings of the Third IASTED International Conference on Communication, 2006
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems.
Proceedings of the Third IASTED International Conference on Communication, 2006
2005
Performance of Group Key Agreement Protocols over Multiple Operations.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005
2004
Web Intell. Agent Syst., 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Experiments on Processing and Linking Semantically Augmented Requirement Specifications.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003
Efficient Allocation in Distributed Object Oriented Databases.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002
2001
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001
2000
Cryptographic Protocol Engineering-Building Security from the Ground Up.
Proceedings of the International Conference on Internet Computing, 2000
Quantum Genetic Algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO '00), 2000
1999
Proceedings of the Formal Syntax and Semantics of Java, 1999
Proceedings of the Formal Syntax and Semantics of Java, 1999
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999
1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
1996
XRDS, 1996
1995
Proceedings of the 1995 Symposium on Network and Distributed System Security, 1995
1992
Modelling Non-Deterministic System in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992
1991
Mechanical Verification of Secure Distributed Systems in Higher Order Logic.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the Compcon Spring '91, San Francisco, 1991