Irvine, Cynthia E.
1205  Ergebnisse:
Personensuche X
?
1

Increasing Log Availability in Unmanned Vehicle Systems:

, In: National Cyber Summit (NCS) Research Track 2021; Lecture Notes in Networks and Systems,
 
?
2

A Strategy for Security Testing Industrial Firewalls:

, In: Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop,
 
?
4

Development of industrial network forensics lessons:

, In: Proceedings of the Fifth Cybersecurity Symposium,
 
?
5

Call in the Cyber National Guard!:

Irvine, Cynthia E. ; Palmer, Charles C.
IEEE Security & Privacy Magazine.  8 (2010)  1 - p. 56-59 , 2010
 
?
6

Hardware trust implications of 3-D integration:

, In: Proceedings of the 5th Workshop on Embedded Systems Security,
Huffmire, Ted ; Levin, Timothy ; Bilzor, Michael... - p. 1-10 , 2010
 
?
7

New Pathways in Identity Management:

Clark, Paul C. ; Cook, Glenn R. ; Fisher, Edward L....
IEEE Security & Privacy Magazine.  8 (2010)  6 - p. 64-67 , 2010
 
?
8

MYSEA : the monterey security architecture:

, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing,
 
?
9

A Tale of Three Cyber-Defense Workshops:

Saydjari, O. Sami ; Irvine, Cynthia E.
IEEE Security & Privacy Magazine.  7 (2009)  6 - p. 60-64 , 2009
 
?
10

A security architecture for transient trust:

, In: Proceedings of the 2nd ACM workshop on Computer security architectures,
 
?
11

A security domain model to assess software for exploitable ..:

, In: Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security,
 
?
12

Analysis of three multilevel security architectures:

, In: Proceedings of the 2007 ACM workshop on Computer security architecture,
 
?
13

Trusted hardware : can it be trustworthy?:

, In: Proceedings of the 44th annual Design Automation Conference,
Irvine, Cynthia E. ; Levitt, Karl - p. 1-4 , 2007
 
1-15