Matt Bishop
Orcid: 0000-0002-7301-7060Affiliations:
- University of California, Davis, Department of Computer Science
According to our database1,
Matt Bishop
authored at least 190 papers
between 1979 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
IEEE Secur. Priv., 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
2022
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles.
CoRR, 2022
Proceedings of the 2022 New Security Paradigms Workshop, 2022
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model.
IEEE Trans. Netw. Serv. Manag., 2021
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education.
Proceedings of the Information Security Education for Cyber Resilience, 2021
Proceedings of the Information Security Education for Cyber Resilience, 2021
Proceedings of the Information Security Education for Cyber Resilience, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Proceedings of the Information Security Education. Information Security in Action, 2020
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
A new method for flow-based network intrusion detection using inverse statistical physics.
CoRR, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
Comput. Secur., 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the New Security Paradigms Workshop, 2018
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the IEEE Frontiers in Education Conference, 2018
2017
Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example.
ACM Trans. Priv. Secur., 2017
Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes.
IEEE Syst. J., 2017
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing.
Proceedings of the 2017 New Security Paradigms Workshop, 2017
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Information Security Education for a Global Digital Society, 2017
Proceedings of the Information Security Education for a Global Digital Society, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Proceedings of the 2016 New Security Paradigms Workshop, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Proceedings of the Information Security Education Across the Curriculum, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Pattern Recognit. Lett., 2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the Information Assurance and Security Education and Training, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Int. J. High Perform. Comput. Appl., 2012
A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems.
Proceedings of the New Security Paradigms Workshop, 2012
Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011
Proceedings of the PETRA 2011, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
The Strengths and Challenges of Analogical Approaches to Computer Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2011
Proceedings of the Information Assurance and Security Education and Training, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
The security and privacy implications of using social networks to deliver healthcare.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response.
Proceedings of the Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08., 2010
2009
ACM SIGCSE Bull., 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Quis Custodiet ipsos Custodes?: a new paradigm for analyzing security paradigms with appreciation to the Roman poet Juvenal.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the Information Assurance and Security Education and Training, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Investigating the Implications of Virtual Machine Introspection for Digital Forensics.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
IEEE Trans. Dependable Secur. Comput., 2007
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
2006
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
2005
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
IEEE Secur. Priv., 2004
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004
2003
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003
Proceedings of the 28th Annual IEEE / NASA Software Engineering Workshop (SEW-28 2003), 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Panel: Teaching Undergraduate Information Assurance.
Proceedings of the Security Education and Critical Infrastructures, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Comput. Secur., 2002
Proceedings of the 11th USENIX Security Symposium, 2002
2001
Development of a Software Security Assessment Instrument to Reduce Software Security Risk.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Comput. Networks, 2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
ACM SIGSOFT Softw. Eng. Notes, 1997
1996
J. Comput. Secur., 1996
1995
1993
Teaching Computer Security.
Proceedings of the Computer Security, 1993
1991
An Authentication Mechanism for USENET.
Proceedings of the Usenix Winter 1991 Conference, Dallas, TX, USA, January 1991, 1991
1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Proceedings of the Proceedings Supercomputing '89, Reno, NV, USA, November 12-17, 1989, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Comput. Syst., 1988
1987
1986
Analyzing the Security of an Existing Computer System.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986
1981
Proceedings of the Eighth Symposium on Operating System Principles, 1981
1979
Proceedings of the Seventh Symposium on Operating System Principles, 1979