Peter M. Mell
#166,011
Most Influential Person Now
Peter M. Mell's AcademicInfluence.com Rankings
Peter M. Mellcomputer-science Degrees
Computer Science
#9958
World Rank
#10446
Historical Rank
Database
#6908
World Rank
#7149
Historical Rank

Download Badge
Computer Science
Peter M. Mell's Degrees
- PhD Computer Science University of Maryland, College Park
Similar Degrees You Can Earn
Why Is Peter M. Mell Influential?
(Suggest an Edit or Addition)Peter M. Mell's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- The NIST Definition of Cloud Computing (2011) (13984)
- Guide to Intrusion Detection and Prevention Systems (IDPS) (2007) (1340)
- SP 800-145. The NIST Definition of Cloud Computing (2011) (1170)
- Common Vulnerability Scoring System (2006) (606)
- Blockchain Technology Overview (2018) (539)
- A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST (2007) (464)
- Intrusion Detection Systems (2001) (419)
- NIST Special Publication on Intrusion Detection Systems (2001) (316)
- "The NIST Definition of Cloud Computing," Version 15 (2009) (245)
- An Overview of Issues in Testing Intrusion Detection Systems (2003) (189)
- An analysis of CVSS version 2 vulnerability scoring (2009) (153)
- Applying Mobile Agents to Intrusion Detection and Response (1999) (136)
- The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems (2007) (102)
- Guide to Malware Incident Prevention and Handling (2005) (75)
- Creating a Patch and Vulnerability Management Program (2005) (70)
- Understanding Intrusion Detection Systems (2001) (60)
- MOBILE AGENTS IN INTRUSION DETECTION AND RESPONSE (54)
- A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems (2019) (51)
- Improving the Common Vulnerability Scoring System (2007) (46)
- The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities (2010) (44)
- What's Special about Cloud Security? (2012) (41)
- A denial-of-service resistant intrusion detection architecture (2000) (38)
- Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems (1999) (37)
- Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme (2002) (37)
- Intrusion Detection and Prevention Systems (2010) (33)
- State of security readiness (2010) (28)
- The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities (2012) (20)
- Procedures for handling security patches (2002) (18)
- Intrusion Detection Systems | NIST (2001) (17)
- Smart Contract Federated Identity Management without Third Party Authentication Services (2019) (16)
- Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology (2005) (15)
- Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness (2017) (13)
- Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems (2016) (12)
- SP 800-83. Guide to Malware Incident Prevention and Handling (2005) (12)
- Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents (2004) (12)
- Understanding the World of your Enemy with I-CAT (Internet-Categorization of Attacks Toolkit) (1999) (10)
- Computer Attacks: What They Are and How to Defend Against Them | NIST (1999) (10)
- CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture (Draft) (1969) (9)
- Vulnerability scoring for security configuration settings (2008) (8)
- Evasion-resistant network scan detection (2015) (8)
- Acquiring and Deploying Intrusion Detection Systems | NIST (1999) (7)
- MOBILE AGENTS IN INTRUSION DETECTION AND RESPONSE 1 (2000) (6)
- Procedures for Handling Security Patches: Recommendations of the National Institute of Standards and Technology (2003) (6)
- Measurements of the Most Significant Software Security Weaknesses (2020) (6)
- Measuring and Improving the Effectiveness of Defense-in-Depth Postures (2016) (5)
- Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency (2018) (5)
- Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks (2014) (5)
- SP 800-40 Version 2.0. Creating a Patch and Vulnerability Management Program (2005) (5)
- Minimizing Attack Graph Data Structures (2015) (4)
- Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems (2017) (4)
- Creating a Patch and Vulnerability Management Program | NIST (2005) (4)
- Considerations for Digital Twin Technology and Emerging Standards (2021) (4)
- The Resilience of the Internet to Colluding Country Induced Connectivity Disruptions (2015) (4)
- Understanding the Global Attack Toolkit Using a Database of Dependent Classifiers | NIST (1998) (4)
- Procedures for Handling Security Patches | NIST (2002) (3)
- Using Network Tainting to Bound the Scope of Network Ingress Attacks (2014) (3)
- Big data technology and implications for security research (2012) (3)
- Emerging Standards (2006) (3)
- Limitations to threshold random walk scan detection and mitigating enhancements (2013) (3)
- A Decade of Reoccurring Software Weaknesses (2021) (2)
- A Historical and Statistical Studyof the Software Vulnerability Landscape (2021) (2)
- On the Internet Connectivity in Africa (2015) (2)
- A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types (2020) (2)
- Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications (2012) (2)
- Measuring the Common Vulnerability Scoring System Base Score Equation (2022) (2)
- CVSS-SIG Version 2 History | NIST (2007) (2)
- Linear Time Vertex Partitioning on Massive Graphs. (2016) (1)
- A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement (2019) (1)
- REDUCING THE COGNITIVE LOAD ON ANALYSTS THROUGH HAMMING DISTANCE BASED ALERT AGGREGATION (2014) (1)
- State of Security Readiness By Ramaswamy Chandramouli and (2010) (1)
- Measuring Limits on the Ability of Colluding Countries to Partition the Internet (2015) (1)
- Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection (2016) (1)
- Quantifying Information Exposure in Internet Routing (2018) (0)
- Augmenting Fiat Currency with an Integrated Managed Cryptocurrency (2019) (0)
- Identifying Critical Patches with ICAT (2000) (0)
- The Generation of Security Scoring Systems Leveraging Human Expert Opinion (2021) (0)
- OBILE A GENTS IN I NTRUSION D ETECTION AND R ESPONSE (0)
- Minimizing Attack Graph Data Structures | NIST (2015) (0)
- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks (2015) (0)
- Securing Web Servers (1999) (0)
- Defensive Resource Allocations with Security Chokepoints in High-risk IPv6 Networks. (2015) (0)
- Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics (2019) (0)
- Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions (0)
- USERS MAY DEMAND NETWORK SERVICES AND PROTOCOLS THAT ARE KNOWN TO BE FLAWED (2001) (0)
- Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (2012) (0)
- (Draft) Recommendations for Federal Vulnerability Disclosure Guidelines (2021) (0)
- Identifying Critical Patches With ICAT | NIST (2000) (0)
- Mobile Agent Attack Resistant Distributed (2009) (0)
- The Generation of Software Security Scoring Systems Leveraging Human Expert Opinion (2022) (0)
- Managing Software Patches and Vulnerabilities (2015) (0)
- Mitigating Emerging Hacker Threats | NIST (2000) (0)
- Mitigating Emerging Hacker Threats (2000) (0)
- Securing Web Servers | NIST (1999) (0)
- Understanding Stablecoin Technology and Related Security Considerations (2022) (0)
- Empirical Validation of Automated Vulnerability Curation and Characterization (2023) (0)
- On the Internet Connectivity in Africa | NIST (2015) (0)
- Implementing a Protocol Native Managed Cryptocurrency (2019) (0)
This paper list is powered by the following services: