Peter Mell
Orcid: 0000-0003-2938-897X
According to our database1,
Peter Mell
authored at least 37 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
IEEE Trans. Software Eng., 2023
2021
CoRR, 2021
CoRR, 2021
2020
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement.
IACR Cryptol. ePrint Arch., 2019
A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems.
CoRR, 2019
Smart Contract Federated Identity Management without Third Party Authentication Services.
Proceedings of the Open Identity Summit 2019, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency.
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017
2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
2014
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014
Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012
2010
Proceedings of the Handbook of Information and Communication Security, 2010
2009
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009
2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
2007
2006
2004
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents.
J. Netw. Syst. Manag., 2004
2000
Comput. Networks, 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999