Gondree, Mark
25  results:
Search for persons X
?
1

DoS Exploitation of Allen-Bradley's Legacy Protocol through..:

, In: Proceedings of the 3rd Annual Industrial Control System Security Workshop,
 
?
3

Geolocation of data in the cloud:

, In: Proceedings of the third ACM conference on Data and application security and privacy,
 
?
4

Security through play:

Gondree, Mark ; Peterson, Zachary N.J. ; Denning, Tamara
IEEE Security & Privacy.  11 (2013)  3 - p. 64-67 , 2013
 
?
5

A position paper on data sovereignty : the importance of..:

, In: Proceedings of the 3rd USENIX conference on Hot topics in cloud computing,
 
?
6

Longest common subsequence as private search:

, In: Proceedings of the 8th ACM workshop on Privacy in the electronic society,
Gondree, Mark ; Mohassel, Payman - p. 81-90 , 2009
 
?
7

MYSEA : the monterey security architecture:

, In: Proceedings of the 2009 ACM workshop on Scalable trusted computing,
 
?
8

Fixing federal e-voting standards:

Barr, Earl ; Bishop, Matt ; Gondree, Mark
Communications of the ACM.  50 (2007)  3 - p. 19-24 , 2007
 
?
9

Fixing federal e-voting standards:

Barr, Earl ; Bishop, Matt ; Gondree, Mark
Communications of the ACM.  50 (2007)  3 - p. 19-24 , 2007
 
?
10

DoS Exploitation of Allen-Bradley's Legacy Protocol through..:

Tacliad, Francisco ; Nguyen, Thuy D ; Gondree, Mark
Tacliad, Francisco, Thuy D. Nguyen, and Mark Gondree. "DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing." In Proceedings of the 3rd Annual Industrial Control System Security Workshop, pp. 24-31. ACM, 2017..  , 2017
 
?
11

Asset Criticality in Mission Reconfigurable Cyber Systems a..:

Price, Peyton ; Leyba, Nicholas ; Gondree, Mark..
Proceedings of the 50th Hawaii International Conference on System Sciences.  , 2017
 
?
14

Re-thinking Kernelized MLS Database Architectures in the Co..:

Nguyen, Thuy D ; Gondree, Mark ; Khasalim, Jean.
Nguyen, T.D., Gondree, M., Khosalim, J. and Irvine, C., 2015, March. Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores. In International Symposium on Engineering Secure Software and Systems (pp. 86-101). Springer, Cham..  , 2015
 
1-15