| 2000 |
| 9 | EE | M. Petkac,
Lee Badger:
Security Agility in Response to Intrusion Detection.
ACSAC 2000: 11-20 |
| 1999 |
| 8 | EE | Timothy Fraser,
Lee Badger,
Mark Feldman:
Hardening COTS Software with Generic Software Wrappers.
IEEE Symposium on Security and Privacy 1999: 2-16 |
| 1998 |
| 7 | EE | Timothy Fraser,
Lee Badger:
Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE.
IEEE Symposium on Security and Privacy 1998: 15-26 |
| 1997 |
| 6 | EE | K. A. Oostendorp,
Lee Badger,
C. D. Vance,
W. G. Morrison,
M. Petkac,
David L. Sherman,
Daniel F. Sterne:
Domain and Type Enforcement Firewalls.
ACSAC 1997: 122-132 |
| 1996 |
| 5 | | Lee Badger,
Daniel F. Sterne,
David L. Sherman,
Kenneth M. Walker:
A Domain and Type Enforcement UNIX Prototype.
Computing Systems 9(1): 47-83 (1996) |
| 1990 |
| 4 | | Lee Badger:
Providing a Flexible Security Override for Trusted Systems.
CSFW 1990: 115-121 |
| 1989 |
| 3 | | Lee Badger:
A Model for Specifying Multi-Granularity Integrity Policies.
IEEE Symposium on Security and Privacy 1989: 269-279 |
| 1988 |
| 2 | | Lee Badger,
Mark Weiser:
Minimizing Communication for Synchronizing Parallel Dataflow Programs.
ICPP (2) 1988: 122-126 |
| 1980 |
| 1 | | Lee Badger:
Beth's Property Fails in L < omega 1.
J. Symb. Log. 45(2): 284-290 (1980) |