The MILS architecture for high-assurance embedded systems J Alves-Foss, PW Oman, C Taylor, WS Harrison International journal of embedded systems 2 (3-4), 239-247, 2006 | 282 | 2006 |
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach C Taylor, J Alves-Foss Proceedings of the 2001 workshop on New security paradigms, 89-96, 2001 | 153 | 2001 |
Formal syntax and semantics of Java J Alves-Foss Springer, 2003 | 136 | 2003 |
The use of encrypted functions for mobile agent security H Lee, J Alves-Foss, S Harrison 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 124 | 2004 |
On preventing replay attacks on security protocols S Malladi, J Alves-Foss, RB Heckendorn International Conference on Security and Management, 77-83, 2002 | 111 | 2002 |
Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening C Taylor, A Krings, J Alves-Foss Proc. ACM Workshop on Scientific Aspects of Cyber Terrorism,(SACT …, 2002 | 101 | 2002 |
A multi-layered approach to security in high assurance systems J Alves-Foss, C Taylor, P Oman 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 83 | 2004 |
An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups J Alves-Foss 23rd National Information Systems Security Conference, 2000 | 69 | 2000 |
A communication–computation efficient group key algorithm for large and dynamic groups S Zheng, D Manz, J Alves-Foss Computer Networks 51 (1), 69-93, 2007 | 66 | 2007 |
An empirical analysis of nate: Network analysis of anomalous traffic events C Taylor, J Alves-Foss Proceedings of the 2002 workshop on New security paradigms, 18-26, 2002 | 57 | 2002 |
Assessing computer security vulnerability J Alves-Foss, S Barbosa ACM SIGOPS Operating Systems Review 29 (3), 3-13, 1995 | 56 | 1995 |
The darpa cyber grand challenge: A competitor's perspective J Song, J Alves-Foss IEEE Security & Privacy 13 (6), 72-76, 2015 | 54 | 2015 |
Guess what? Here is a new tool that finds some new guessing attacks R Corin, S Malladi, J Alves-Foss, S Etalle Workshop on Issues in the Theory of Security, 2003 | 54 | 2003 |
The mils architecture for a secure global information grid WS Harrison, N Hanebutte, P Oman, J Alves-Foss Crosstalk: The Journal of Defense Software Engineering 18 (10), 20-24, 2005 | 51 | 2005 |
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in mls systems J Son 2006 IEEE Information Assurance Workshop, 361-368, 2006 | 47 | 2006 |
Securing database as a service: Issues and compromises J Weis, J Alves-Foss IEEE Security & Privacy 9 (6), 49-55, 2011 | 46 | 2011 |
Quantum evolutionary programming B Rylander, T Soule, J Foster, J Alves-Foss Proceedings of the Genetic and Evolutionary Computation Conference (GECCO …, 2001 | 45 | 2001 |
Dynamic denotational semantics of Java J Alves-Foss, FS Lam Formal syntax and semantics of Java, 201-240, 2002 | 43 | 2002 |
Autonomous rule creation for intrusion detection T Vollmer, J Alves-Foss, M Manic 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2011 | 42 | 2011 |
Multi-protocol attacks and the public key infrastructure J Alves-Foss Proc. 21st National Information Systems Security Conference, 566-576, 1998 | 41 | 1998 |