Peter G. Neumann
#177,781
Most Influential Person Across History
Peter G. Neumann's AcademicInfluence.com Rankings
Peter G. Neumanncriminal-justice Degrees
Criminal Justice
#183
Historical Rank
Cyber Security
#17
Historical Rank
Peter G. Neumanncomputer-science Degrees
Computer Science
#6479
Historical Rank
Cybersecurity
#17
Historical Rank
Peter G. Neumannmathematics Degrees
Mathematics
#8899
Historical Rank
Applied Mathematics
#241
Historical Rank
Measure Theory
#1683
Historical Rank
Download Badge
Criminal Justice Computer Science Mathematics
Peter G. Neumann's Degrees
- Masters Applied Mathematics Stanford University
- Bachelors Mathematics Case Western Reserve University
Similar Degrees You Can Earn
Why Is Peter G. Neumann Influential?
(Suggest an Edit or Addition)Peter G. Neumann's Published Works
Published Works
- EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances (1997) (948)
- Computer-related risks (1994) (588)
- Experience with EMERALD to Date (1999) (270)
- The CHERI capability model: Revisiting RISC in an age of risk (2014) (262)
- CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization (2015) (191)
- The risks of key recovery, key escrow, and trusted third-party encryption (1997) (179)
- Views for Multilevel Database Security (1987) (133)
- The future of the internet of things (2017) (126)
- The foundations of a provably secure operating system (PSOS) (1979) (116)
- Internet gambling (1998) (107)
- Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology (1988) (89)
- Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine (2015) (85)
- Toward a safer and more secure cyberspace (2007) (77)
- IDES : The Enhanced Prototype A Real-Time Intrusion-Detection Expert System (1988) (76)
- On hierarchical design of computer systems for critical applications (1986) (72)
- Principled assuredly trustworthy composable architectures (2003) (70)
- PSOS revisited (2003) (66)
- Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture (2014) (64)
- Clean Application Compartmentalization with SOAAP (2015) (63)
- Practical Architectures for Survivable Systems and Networks (1999) (62)
- Views for Multilevel Database Security (1986) (60)
- Security by obscurity (2003) (54)
- A Provably Secure Operating System. (1975) (53)
- Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals (2019) (52)
- IDES: A Progress Report (1990) (48)
- On attaining reliable software for a secure operating system (1975) (48)
- Risks of e-education (1998) (44)
- Risking Communications Security: Potential Hazards of the Protect America Act (2008) (41)
- Computer system - Security evaluation (1899) (41)
- CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment (2019) (39)
- Efficient Tagged Memory (2017) (36)
- CHERI Concentrate: Practical Compressed Capabilities (2019) (35)
- Risks of passwords (1994) (34)
- Blueswitch: enabling provably consistent configuration of network switches (2015) (33)
- CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety (2019) (32)
- Fast Protection-Domain Crossing in the CHERI Capability-System Architecture (2016) (32)
- CHERI JNI: Sinking the Java Security Model into the C (2017) (32)
- Risks to the public (2006) (29)
- Reliability and Security (1995) (28)
- Risks to the public in computers and related systems (2001) (28)
- Cornucopia: Temporal Safety for CHERI Heaps (2020) (26)
- Inside risks: risks of insiders (1999) (26)
- Practical Architectures for Survivable Systems and Networks: Phase-One Final Report (1999) (25)
- Risks of RFID (2006) (24)
- Inside Risks: denial-of-service attacks (2000) (24)
- Robust Nonproprietary Software (2000) (23)
- CHERI: a research platform deconflating hardware virtualisation and protection (2012) (23)
- Identity-related misuse (1997) (23)
- Verification for Electronic Balloting Systems (2003) (23)
- Survivable systems (1992) (21)
- Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process (2020) (21)
- Risks and myths of cloud computing and cloud storage (2014) (20)
- Combatting Insider Threats (2010) (20)
- Architectures and Formal Representations for Secure Systems (1995) (20)
- Error-Correcting Codes for Byte-Organized Arithmetic Processors (1975) (20)
- Forum on risks to the public in computers and related systems (1996) (20)
- System development woes (1993) (19)
- Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks (2018) (18)
- Risks of insiders (1999) (17)
- Risks to the public in computers and related systems (2004) (17)
- IDES: a progress report (Intrusion-Detection Expert System) (1990) (17)
- Robust open-source software (1999) (16)
- System and network trustworthiness in perspective (2006) (15)
- Software development and proofs of multi-level security (1976) (14)
- Risks of automation (2016) (14)
- The foresight saga, redux (2012) (14)
- The foresight saga (2006) (14)
- Denial-of-Service Attacks. (2000) (13)
- Risks to the public in computer systems (1986) (13)
- Capabilities Revisited : A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems (2010) (13)
- Crypto policy perspectives (1994) (13)
- Inside risks: risks in computerized elections (1990) (13)
- Are computers addictive? (1998) (13)
- Bugs in our Pockets: The Risks of Client-Side Scanning (2021) (12)
- Using formal methods to reduce risks (1996) (12)
- Risks to the Public (2005) (12)
- Security kernels (1974) (11)
- Bluespec Extensible RISC Implementation: BERI Hardware reference (2014) (11)
- Risks to the Public in Computers and Related Systems (1995) (11)
- Certitude and rectitude (2000) (10)
- An Introduction to CHERI (2019) (10)
- Risks of National Identity Cards (2001) (10)
- Risks of Untrustworthiness (2006) (10)
- Inside risks: Internet risks (2000) (10)
- Attaining robust open source software (2005) (10)
- Risks in Computerized Elections. (1990) (9)
- Holistic Systems (2006) (9)
- Effects of multilevel security on real-time applications (1993) (9)
- Are dependable systems feasible? (1993) (9)
- Distributed Systems have Distributed Risks (1996) (9)
- Inside risks: robust open-source software (1999) (9)
- Inside RISKS: putting on your best interface (1991) (9)
- Risks in digital commerce (1996) (8)
- Risks relating to system compositions (2006) (8)
- A Study of Fault-Tolerant Computing (1973) (8)
- Information system security redux (2003) (8)
- Automated Car Woes---Whoa There! (2016) (7)
- Risks of neglecting infrastructure (2008) (7)
- Inside risks: Risks of anonymity (1996) (7)
- Fundamental Trustworthiness Principles (2010) (7)
- Review of "The Sachertorte algorithm and other antidotes to computer anxiety" by John Shore. Viking 1985. (1985) (7)
- Reflections on computer-related risks (2008) (7)
- Collaborative efforts (1991) (7)
- Risks to the public in computer systems (1986) (7)
- Inside Risks The Future of the Internet of Things (7)
- Responsibilities of technologists (2005) (7)
- The role of software engineering (1993) (7)
- Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide (2015) (7)
- CheriRTOS: A Capability Model for Embedded Devices (2018) (7)
- Crypto key management (1997) (7)
- Toward a Methodology for Designing Large Systems and Verifying Their Properties (1974) (7)
- Lost Treasures (2012) (6)
- CHERI C/C++ Programming Guide (2020) (6)
- Inside risks: certifying professionals (1991) (6)
- Trustworthiness and truthfulness are essential (2017) (6)
- Inside risks: spam, spam, spam! (1997) (6)
- Illustrative risks to the public in the use of computer systems and related technology (1994) (6)
- Inside risks: the clock grows at midnight (1991) (6)
- Achieving principled assuredly trustworthy composable systems and networks (2003) (6)
- Expectations of security and privacy (1994) (6)
- Alternative passwords (1994) (6)
- Computers, ethics, and values (1991) (5)
- Through computer architecture, darkly (2019) (5)
- Where to place trust (1992) (5)
- Psychosocial implications of computer software development and use (1982) (5)
- Risks to the public and related systems (1988) (5)
- Laptops in Congress? (1998) (5)
- The SRI Hierarchical Development Methodology (HDM) and its Application to the Development of Secure Software | NIST (1980) (5)
- Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy (2010) (5)
- Inside risks: risks of content filtering (1999) (5)
- The computer-related risk of the year: distributed control (1990) (5)
- The computer-related risk of the year: misplaced trust in computer systems (1989) (5)
- E-epistemology and misinformation (2003) (5)
- Inside risks: some reflections on a telephone switching problem (1990) (5)
- Inside risks: insecurity about security? (1990) (5)
- Animal crackers (1993) (5)
- Clean application compartmentalization with SOAAP (extended version) (2015) (5)
- Fraud by computer (1992) (4)
- Introduction to Special Issue on Software for Critical Systems (1993) (4)
- Reflections on systems trustworthiness (2007) (4)
- Optimistic optimization (2004) (4)
- The computer-related risk of the year: computer abuse (1988) (4)
- Widespread network failures (2007) (4)
- Inside risks: expecting the unexpected mayday (1991) (4)
- Risks of surveillance (1993) (4)
- Design of a fault tolerant airborne digital computer. Volume 1: Architecture (1973) (4)
- Far-sighted thinking about deleterious computer-related events (2015) (4)
- Capability Hardware Enhanced RISC Instructions: CHERI User’s guide (2014) (3)
- Protecting the infrastructures (1998) (3)
- Integrity in software development (1997) (3)
- How might we increase system trustworthiness? (2019) (3)
- Computer Security Technology: Guest Editors' Introduction (1983) (3)
- The risks of self-auditing systems (2016) (3)
- Risks considered global(ly) (1993) (3)
- Don't Trade Privacy for Security (2005) (3)
- Risks on the information superhighway (1994) (3)
- Risks in trusting untrustworthiness (2003) (3)
- Reassessing the crypto debate (1995) (3)
- Review of "The Hacker's Dictionary--A Guide to the World of Computer Wizards by Guy L. Steele Jr, Donald R. Woods, Raphael A. Finkel, Mark R. Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow," Harper & Row, Publishers, New York (1984) (3)
- Spam, Spam, Spam! (1997) (3)
- Anticipating disasters (2005) (3)
- Balancing Disruption and Deployability in the CHERI Instruction-Set Architecture (ISA) (2017) (2)
- A Center for Correct , Usable , Reliable , Auditable , and Transparent Elections ( ACCURATE ) (2005) (2)
- Beauty and the beast the software complexity—elegance versus elephants (1990) (2)
- Gambling on system accountability (2003) (2)
- Inside risksU.S. election after-math (2009) (2)
- Errata—Interchanged pages in the previous issue: SEN 14-1: Page 31 and Page 46 (1989) (2)
- Formal Techniques for Fault-Tolerance in Distributed Data Processing (DDP). (1980) (2)
- Risk on the rails (1993) (2)
- CompartOS: CHERI Compartmentalization for Embedded Systems (2022) (2)
- Disability-related risks (2005) (2)
- Risks to the public in computers and related systems (2000) (2)
- Computer vulnerabilities: exploitation or avoidance (1995) (2)
- INSIDE RISKS : FRAUD BYH COMPUTER (1992) (2)
- Risks of Technology (1995) (2)
- Reviewing the risks archives (1995) (2)
- Technology, laws, and society (1994) (2)
- Risks to the Public (2018) (2)
- Risks to the Public (2016) (2)
- Leap-year problems (1992) (2)
- The big picture (2018) (2)
- Cryptography in public: a brief history (1995) (2)
- Risks to the public (2011) (2)
- Risks of Y2K. (1999) (2)
- A perspective from the RISKS forum (1991) (2)
- Position Paper:Defending Direct Memory Access with CHERI Capabilities (2020) (2)
- More sight on foresight (2013) (2)
- Inside Risks: Missile defense (2000) (1)
- Risks of Computer-Related Technology (2006) (1)
- Inside risks: system integrity revisited (2001) (1)
- Inside risks: linguistic risks (1996) (1)
- Risks to the Public (2015) (1)
- Inside risks: computers: boon or bane? (2001) (1)
- CheriABI (2019) (1)
- The ultra challenge: software systems beyond big (2006) (1)
- Inside "Risks of Risks". (1992) (1)
- Regulatory requirements for software safety: policy issues (panel position statement) (1989) (1)
- inside risks more sight on Foresight (2013) (1)
- Requirements-related risks in critical systems (2000) (1)
- CHERIvoke (2019) (1)
- Risks to the public in computer systems (1986) (1)
- Information is a double-edged sword (1999) (1)
- Risks in our information infrastructures (2000) (1)
- Security and Privacy Issues in Computer and Communication Systems (1997) (1)
- Consideration on risks in using computing technology (1988) (1)
- E-migrating risks? (2007) (1)
- INSIDE RISKS : WHERE TO PLACE TRUST (1992) (1)
- Security Risks in the Computer-communication Infrastructure (1996) (1)
- Review of "The hacker's dictionary: a guide to the world of computer wizards" by Guy L. Steele, Donald R. Woods, Raphael A. Finkel, Mark R. Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow. Harper & Row Publishers 1983. (1984) (1)
- Inside Risks: Inside “Inside Risks” (1994) (1)
- Inside risks: system development woes (1997) (1)
- Risks to the public in computers and related systems (1989) (1)
- The IEEE Symposium on Security and Privacy Is Moving to San Francisco (2012) (1)
- Risks of Easy Answers (1995) (1)
- Computers: boon or bane? (2001) (1)
- Inside Risks: A Holistic View of Future Risks (2020) (1)
- Inside risks: ghosts, mysteries and uncertainty (1990) (1)
- 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 (2015) (1)
- V viewpoints Inside Risks The Risks of Self-Auditing Systems (1)
- Modular Research-Based Composably Trustworthy Mission-Oriented Resilient Clouds (MRC2) (2016) (1)
- Risks to the public in computers and related systems (1996) (1)
- Trustworthy systems revisited (2006) (1)
- The IEEE Symposium on Security and Privacy, in Retrospect (2014) (1)
- Inside risks: a few old coincidences (1990) (1)
- Myths of dependable computing: shooting the straw herrings in midstream (1993) (1)
- The risks of election believability (or lack thereof) (2021) (1)
- Avoiding weak links (1992) (1)
- Inside risks: risks in retrospect (2000) (1)
- The human element (1991) (1)
- Accidental financial losses (1992) (1)
- Book review: Software Creativity by Robert L. Glass (1995) (0)
- Risks to the Public (2016) (0)
- Using Names as Identifiers. (1993) (0)
- Risks to the public (2010) (0)
- The emergence of maternal-fetal conflict policies. (1991) (0)
- Risks to the public in computers and related systems (1996) (0)
- Risks to the public (2013) (0)
- Risks to the public in computers and related systems (1998) (0)
- Risks to the public (2006) (0)
- Inside Risks: Risks of panic (2001) (0)
- Risks to the public in computers and related systems (2000) (0)
- Risks to the public (2007) (0)
- A Contextual View of Insiders and Insider Threats (2018) (0)
- Risks to the Public (2021) (0)
- Risks to the public (2009) (0)
- Risks to the Public (2016) (0)
- Risks to the public in computers and related systems (1997) (0)
- Risks to the Public (2023) (0)
- Risks to the public (1988) (0)
- Risks to the Public (2015) (0)
- Risks to the public (2013) (0)
- Risks to the public (2008) (0)
- Risks to the public in computers and related systems (1996) (0)
- CHERI: A Hardware-Software System to Support the Principle of Least Privilege (2016) (0)
- Risks to the Public (2015) (0)
- Risks to the public in computers and related systems (2005) (0)
- A Risks-related Bookshelf. (1996) (0)
- Risks to the Public (2022) (0)
- Inside risks: risks of Y2K (1999) (0)
- Risks to the Public (2022) (0)
- Risks to the Public (2021) (0)
- Risks to the Public (2021) (0)
- Risks to the public (2010) (0)
- Risks to the public (2013) (0)
- Risks to the Public (2014) (0)
- What to know about risks. (2001) (0)
- Risks to the Public (2023) (0)
- Security risks in computer-communication systems (1997) (0)
- Risks to the public (2008) (0)
- The need for federal standards on confidentiality of medical records. (1994) (0)
- Risks to the public (2008) (0)
- Risks to the public in computers and related systems (2003) (0)
- Risks to the public in computers and related systems (1997) (0)
- Towards a Theory of Application Compartmentalisation (2013) (0)
- Risks to the Public (2021) (0)
- Carrying Goals to Newcastle: A Tribute to Brian Randell (2011) (0)
- Risks to the public (2011) (0)
- Risks to the public (2007) (0)
- Modeling and simulation (1993) (0)
- Inside risks: Disinformation theory (1996) (0)
- Risks to the public in computers and related systems (2002) (0)
- Inside Risks: interpreting (MIS)information (1991) (0)
- Risks to the public in computers and related systems (1998) (0)
- Inside risks: a risks-related bookshelf (1996) (0)
- Randomized Testing of RISC-V CPUs using Direct Instruction Injection (2023) (0)
- Risks to the Public (2019) (0)
- Risks to the public in computers and related systems (1995) (0)
- A Report by an Ad Hoc Group of Cryptographers and Computer Scientists & Trusted Third Party Encryption (1998) (0)
- Developing Complex Software for Critical Systems (1992) (0)
- Architectures and Formal Representations for Secure Systems Architectures and Formal Representations for Secure Systems Executive Summary (0)
- Risks to the Public (2018) (0)
- Risks to the public in computers and related systems (2002) (0)
- Risks to the public in computers and related systems (2004) (0)
- Toward total-system trustworthiness (2022) (0)
- Risks to the Public (2012) (0)
- Risks to the public (2009) (0)
- Risks to the public (1987) (0)
- Risks to the public (2013) (0)
- Coalition Petition to the U.S. Department of Education to Amend 34 CFR Part 99 to Establish a Data Security Rule (2016) (0)
- Risks, Responsibilities, and the Future: Walking the Tightwire. (1995) (0)
- Risks to the public (2005) (0)
- INSIDE RISKS : COLLABORATIVE EFFORTS (1991) (0)
- Risks to the Public (2013) (0)
- Risks to the public (2011) (0)
- Machanizing proof: computing, risk, and trust (2001) (0)
- Risks to the Public (2020) (0)
- Risks to the Public (2014) (0)
- Risks, responsibilities, and the future (abstract): walking the tightwire (1995) (0)
- Recent SRI work in verification (1981) (0)
- Risks to the Public (2021) (0)
- Report of evening session protection (1973) (0)
- Risks to the public (2006) (0)
- Risks to the Public in Computers and Related Systems (1995) (0)
- Inside risks: a tale of two thousands (2000) (0)
- Risks to the public (2008) (0)
- Risks to the Public (2021) (0)
- Risks to the public (2011) (0)
- Risks to the Public (2017) (0)
- Risks to the public in computers and related systems (1990) (0)
- Risks to the Public (2021) (0)
- Risks to the public (2007) (0)
- Aggravation by computer: life, death, and taxes (1992) (0)
- Risks to the public in computers and related systems (1995) (0)
- Risks to the Public (2018) (0)
- Risks to the Public (2017) (0)
- Risks to the Public (2021) (0)
- Risks to the public in computers and related systems (1998) (0)
- Ghosts, mysteries and uncertainty (1990) (0)
- Inside "Inside Risks". (1994) (0)
- Risks to the public in computers and related systems (1998) (0)
- Risks to the public in computers and related systems (2005) (0)
- Risks to the public in computers and related systems (2000) (0)
- Retrospective introduction to VERkshop II (1981) (0)
- Combatting Insider Misuse , with Relevance to Integrity and Accountability in Elections and Other Applications (2008) (0)
- Risks to the Public (2021) (0)
- Risks in retrospect. (2000) (0)
- Risks to the public (2014) (0)
- Risks to the public (2007) (0)
- Risks to the public in computers and related systems (1990) (0)
- 2 Introduction to Principled Systems (2017) (0)
- Risks to the public (2005) (0)
- Insecurity about security (1990) (0)
- Risks to the public (2010) (0)
- Risks to the Public (2017) (0)
- IC Online Exclusive Interview: Internet Security - Beyond Cryptography (1999) (0)
- A Total-System View: Who and What Should You Trust (or Not)? (2010) (0)
- Risks to the public (2006) (0)
- Gambling on Systems Accountability (2003) (0)
- Risks to the Public (2019) (0)
- Risks to the public in computers and related systems (1991) (0)
- What's in a name? (1992) (0)
- Risks to the public (2006) (0)
- A . 00 o 00 Q A STUDY OF FAULT-TOLERANT COMPUTING : FIRST SEMI-ANNUAL TECHNICAL PROGRESS REPORT by (2013) (0)
- Risks to the public in computers and related systems (2003) (0)
- Risks to the Public (2015) (0)
- Risks to the Public (2022) (0)
- Risks to the public (2009) (0)
- Risks to the public (2010) (0)
- Risks to the public (2012) (0)
- Inside risks : reviewing the risks archives (1995) (0)
- "Fear of AIDS" cases lead to uncertainty in dealing with HIV-infected practitioners. (1994) (0)
- Risks to the Public (2019) (0)
- Illustrative risks to the public in the use of computer systems and related technology (1996) (0)
- Risks to the public (2009) (0)
- Social and Technical Implications of Nonproprietary Software (2003) (0)
- Risks to the public (2014) (0)
- Risks to the Public (2016) (0)
- A Tale of Two Thousands. (2000) (0)
- 4.2.3 Resolver Component 4.3 Nides Security Oocer User Interface 4.4 Nides Infrastructural Components 4.2.1 Statistical Analysis Component 4.2.2 Rulebased Analysis Component (2007) (0)
- Risks to the Public (2018) (0)
- Risks to the public in computers and related systems (1997) (0)
- Risks to the public in computers and related systems (2003) (0)
- The not-so-accidental holist (1991) (0)
- Decode Execute Memory Access Capability Coprocessor Instruction Cache MMU : TLB Data Cache Memory Control Coprocessor Register (2017) (0)
- PRIVACY ON THE LINE : A BOOK REVIEW (1998) (0)
- State legislative approaches to regulating the use of genetic information. (1995) (0)
- Inside risks: using names as identifiers (1993) (0)
- Risks to the public in computers and related systems (2001) (0)
- When Can Formal Methods Make a Real Difference? (2004) (0)
- The Relative Merits of Openness in Voting Systems California Senate Elections Committee Hearing (2006) (0)
- Risks to the public (2010) (0)
- Risks to the Public (2022) (0)
- Risks to the public in computers and related systems (2002) (0)
- CRASH-worthy Trustworthy Systems R&D (CTSRD): CHERI System Architecture and Research (2019) (0)
- Risks to the public (2012) (0)
- Risks to the public in computers and related systems (2002) (0)
- Risks to the public in computers and related systems (1987) (0)
- Inside risks: information is a double-edged sword (1999) (0)
- Friendly fire (1994) (0)
- Risks to the Public (2020) (0)
- Risks to the Public (2020) (0)
- Identity-Ralated Misuse. (1997) (0)
- Inside risks: Hopes for fewer risks? (1997) (0)
- Risks to the public (2012) (0)
- Risks to the Public (2011) (0)
- Internal surveillance, external risks (2007) (0)
- Special report on patient care. Supreme Court upholds state court decision in Cruzan. (1990) (0)
- Security risks in computer-communication systems (1996) (0)
- Computer-Related Risk Futures (2009) (0)
- Risks to the public (2009) (0)
- Plenary Session #5: how to hack an election (2002) (0)
- Risks to the public (1987) (0)
- Inside Risks Toward Total-System (2022) (0)
- Risks to the public (1988) (0)
- Risks to the Public (2017) (0)
- Risks to the public (2008) (0)
- Risks to the public (2011) (0)
- INSIDE RISKS OF RISKS : INSIDE RISKS (1992) (0)
- Risks to the public in computers and related systems (1993) (0)
- Risks to the public (1990) (0)
- Reminiscences on SOSP history day (2015) (0)
- Risks to the public (2006) (0)
- Inside RISKS: inside “RISKS of RISKS” (1992) (0)
- Risks to the public in computers and related systems (2004) (0)
- Abstract from report on the invitational workshop—integrity policy (1987) (0)
- Telemedicine--the diagnostic tool of the future. (1995) (0)
- The big picture (2022) (0)
- Risks to the public in computers and related systems (1997) (0)
- INSIDE RISKS : RISKS CONSIDERED GLOBAL (LY) (1993) (0)
- Risks to the public in computers and related systems (1991) (0)
- Clean Application Compartmentalization with SOAAP ( Extended Version ) Khilan Gudka (2016) (0)
- Risks to the public (2008) (0)
- Are trusted computer system standards useful for the development of systems whose criticality is other than security? (1990) (0)
- Risks to the public (2013) (0)
- Inside risks: what to know about (2001) (0)
- A holistic view of future risks (2020) (0)
- Risks to the Public (2015) (0)
- Oral history interview with Peter G. Neumann (2013) (0)
- Analysis and Response for Intrusion Detection in Large Networks (1996) (0)
- A security roundtable (1992) (0)
- Risks to the public (2005) (0)
- Risks to the Public (2020) (0)
- Risks to the public (2012) (0)
- Risks to the public in computers and related systems (2000) (0)
- Risks to the Public (2021) (0)
- Risks to the public (2007) (0)
- Risks to the Public (2021) (0)
- W(h)ither research and education? (1996) (0)
- Security risks in computer-communication systems (1996) (0)
- Risks to the public in computers and related systems (2003) (0)
- Risks to the public (2014) (0)
- Risks to the Public (2016) (0)
- Risks to the Public (2022) (0)
- DHS-Relevant RFID-Related Risks (2005) (0)
- Risks to the public in computers and related systems (2001) (0)
- Risks to the public in computers and related systems (1999) (0)
- Risks to the public in computer systems (1986) (0)
- Risks to the public (2014) (0)
- Risks to the public (2012) (0)
- Risks to the public (2010) (0)
- Risks to the public (2022) (0)
- Where Do We Go from Here? (1991) (0)
- Session details: Inside risks (2018) (0)
- Risks to the Public (2019) (0)
- Risks to the Public (2019) (0)
- Risks to the Public (2015) (0)
- Risks to the public in computers and related systems (2001) (0)
- ICANN in Year 3 (2002) (0)
This paper list is powered by the following services: