Æȷοì
Matthew Elder
Matthew Elder
Johns Hopkins University Applied Physics Laboratory
jhuapl.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid malcode, 1-10, 2003
3412003
On computer viral infection and the effect of immunization
C Wang, JC Knight, MC Elder
Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 246-256, 2000
2172000
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications ¡¦, 2009
1052009
Survivability Architectures: Issues and Approaches
C Wang, JC Knight, MC Elder, KJ Sullivan
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2000
100*2000
Survivability architectures: Issues and approaches
JC Knight, KJ Sullivan, MC Elder, C Wang
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 ¡¦, 2000
1002000
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
902002
Specifying user interfaces for safety-critical medical systems
M Elder, J Knight
Proc. of the 2nd Annual International Symposium on Medical Robotics and ¡¦, 1995
84*1995
Specification of User Interface for Safety-Critical Systems
M Elder
University of Virginia, 1995
841995
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
812016
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
612014
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
DARPA, Washington DC, 2002
542002
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
442009
The MEERKATS Cloud Security Architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International ¡¦, 2012
422012
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
382002
On viral propagation and the effect of immunization
C Wang, JC Knight, MC Elder
Proceedings of 16th ACM Annual Computer Applications Conference, 2000
282000
Fault tolerance in critical information systems
MC Elder
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2001
252001
Security patterns template and tutorial
D Kienzle, M Elder, D Tyree, J Edwards-Hewitt
February, 2002
242002
Error recovery in critical infrastructure systems
JC Knight, MC Elder, X Du
Computer Security, Dependability and Assurance: From Needs to Solutions ¡¦, 1998
241998
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
Resilient Control Systems (ISRCS), 2013 6th International Symposium on, 150-155, 2013
222013
Method and apparatus for identifying invariants to detect software tampering
BT Witten, MC Elder
US Patent 8,108,931, 2012
212012
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20