Recent worms: a survey and trends DM Kienzle, MC Elder Proceedings of the 2003 ACM workshop on Rapid Malcode, 1-10, 2003 | 346 | 2003 |
Efficient backups using dynamically shared storage pools in peer-to-peer networks MP Spertus, S Kritov, DM Kienzle, HF Van Rietschote, AT Orling, ... US Patent 7,529,785, 2009 | 184 | 2009 |
A new model of security for distributed systems WA Wulf, C Wang, D Kienzle Proceedings of the 1996 workshop on New security paradigms, 34-43, 1996 | 96 | 1996 |
Security patterns repository version 1.0 DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt DARPA, Washington DC, 2002 | 91 | 2002 |
System and method for vulnerability risk analysis MC Elder, DM Kienzle, PK Manadhata, RK Persaud US Patent 9,317,692, 2016 | 85 | 2016 |
Preventing data from being submitted to a remote system in response to a malicious e-mail D Kienzle, J Croall US Patent 7,516,488, 2009 | 71 | 2009 |
Detecting network devices and mapping topology using network introspection by collaborating endpoints D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki US Patent 8,844,041, 2014 | 65 | 2014 |
Final technical report: Security patterns for web application development DM Kienzle, MC Elder University of Virginia, USA, 2002 | 54 | 2002 |
Validation of secure sockets layer communications D Kienzle, M Elder US Patent 7,634,811, 2009 | 45 | 2009 |
The meerkats cloud security architecture AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ... 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 43 | 2012 |
A practical approach to security assessment DM Kienzle, WA Wulf Proceedings of the 1997 workshop on New security paradigms, 5-16, 1998 | 41 | 1998 |
Security patterns for web application development DM Kienzle, MC Elder University of Virginia technical report, 2002 | 37 | 2002 |
On-box active reconnaissance D Kienzle, P Swinton US Patent 7,934,257, 2011 | 29 | 2011 |
Security patterns template and tutorial DM Kienzle, M Elder, D Tyree, J Edwards-Hewitt 2002b. Accessed August 20, 6, 2002 | 24 | 2002 |
Preliminary experience using Z to specify a safety-critical system JC Knight, DM Kienzle Z User Workshop, London 1992: Proceedings of the Seventh Annual Z User …, 1993 | 24 | 1993 |
Security patterns repository DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt DARPA, Washington DC, 2002 | 21 | 2002 |
Some weaknesses of the TCB model B Blakley, DM Kienzle Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 17 | 1997 |
Reuse of specifications JC Knight, DM Kienzle Proceedings of the 5th Annual Workshop on Software Reuse, 1992 | 15 | 1992 |
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints M Hart, D Kienzle, P Ashley US Patent 9,419,986, 2016 | 14 | 2016 |
Determining model information of devices based on network device identifiers DM Kienzle, MC Elder, NS Evans US Patent 9,135,293, 2015 | 13 | 2015 |