Balenson, David
13  results:
Search for persons X
?
1

Toward Findable, Accessible, Interoperable, and Reusable Cy..:

, In: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test,
Balenson, David ; Benzel, Terry ; Eide, Eric... - p. 65-70 , 2022
 
?
2

Cyber Security Awareness Requirements for Operational Techn..:

, In: Critical Infrastructure Protection XV; IFIP Advances in Information and Communication Technology,
 
?
3

Cyber State Requirements for Design and Validation of Trust..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIV,
 
?
5

A Comparative Analysis Approach for Deriving Failure Scenar..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII,
Locasto, Michael ; Balenson, David - p. 19-50 , 2019
 
?
8

Barriers to science in security:

, In: Proceedings of the 26th Annual Computer Security Applications Conference,
Longstaff, Tom ; Balenson, David ; Matties, Mark - p. 127-129 , 2010
 
?
9

ISAKMP Key Recovery Extensions:

Balenson, David ; Markham, Tom
Computers & Security.  19 (2000)  1 - p. 91-99 , 2000
 
?
10

Commercial key recovery:

Walker, Stephen T. ; Lipner, Steven B. ; Ellison, Carl M..
Communications of the ACM.  39 (1996)  3 - p. 41-47 , 1996
 
?
11

Commercial key recovery:

Walker, Stephen T. ; Lipner, Steven B. ; Ellison, Carl M..
Communications of the ACM.  39 (1996)  3 - p. 41-47 , 1996
 
?
12

Cyber State Requirements for Design and Validation of Trust..:

Ellis, Tim ; Locasto, Michael ; Balenson, David
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-030-62840-6_4.  , 2020
 
?
13

A Comparative Analysis Approach for Deriving Failure Scenar..:

Locasto, Michael ; Balenson, David
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-030-34647-8_2.  , 2019
 
1-13