Terry V. Benzel

Orcid: 0000-0002-3885-4648

Affiliations:
  • University of Southern California, Information Sciences Institute, Los Angeles, USA


According to our database1, Terry V. Benzel authored at least 42 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
IEEE Security and Privacy Symposium in the Year 2003.
IEEE Secur. Priv., 2023

Security and Privacy Research Artifacts: Are We Making Progress?
IEEE Secur. Priv., 2023

2022
Selected Papers From the 2021 IEEE Symposium on Security and Privacy.
IEEE Secur. Priv., 2022

Cybersecurity as illuminator for the future of computing research.
Commun. ACM, 2022

Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2021
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions.
IEEE Secur. Priv., 2021

Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector?
IEEE Secur. Priv., 2021

Cybersecurity research for the future.
Commun. ACM, 2021

2020
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps.
IEEE Secur. Priv., 2020

Toward Orchestration of Complex Networking Experiments.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

2019
Selected Papers From the 2018 USENIX Security Symposium.
IEEE Secur. Priv., 2019

2018
Selected Papers from the 2017 IEEE Symposium on Security and Privacy.
IEEE Secur. Priv., 2018

2017
Selected Papers from the 2016 IEEE Symposium on Security and Privacy.
IEEE Secur. Priv., 2017

2016
The Growth of a Conference, a Community, and an Industry.
IEEE Secur. Priv., 2016

The IEEE Security and Privacy Symposium Workshops.
IEEE Secur. Priv., 2016

DETERLab and the DETER Project.
Proceedings of the GENI Book, 2016

2015
A Strategic Plan for Cybersecurity Research and Development.
IEEE Secur. Priv., 2015

An Enduring Symposium for Leading Research in Security and Privacy.
IEEE Secur. Priv., 2015

2014
A Symposium, a Magazine, and a Community.
IEEE Secur. Priv., 2014

Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

2013
Crossing the Great Divide: From Research to Market.
IEEE Secur. Priv., 2013

Crossing the Great Divide: Transferring Security Technology from Research to the Market.
IEEE Secur. Priv., 2013

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation.
J. Inf. Process., 2012

Teaching Cybersecurity with DeterLab.
IEEE Secur. Priv., 2012

2011
The science of cyber security experimentation: the DETER project.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2009
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
Proceedings of the Trusted Computing, 2009

Idea: Trusted Emergency Management.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
Information Assurance Technology Forecast 2008.
IEEE Secur. Priv., 2008

2007
Design, Deployment, and Use of the DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

2006
Systemic Security Management.
IEEE Secur. Priv., 2006

Experience with deter: A testbed for security research.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

2004
Cyber defense technology networking and evaluation.
Commun. ACM, 2004

1996
SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1993
Real-time trust with 'System Build': lessons learned.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1989
Formal Policies for Trusted Processes.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

Developing trusted systems using DOD-STD-2167A.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1985
Verification technology and the A1 criteria.
ACM SIGSOFT Softw. Eng. Notes, 1985

Trusted Software Verification: A Case Study.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1984
Analysis of a Kernel Verification.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984


  Loading...