| 2007 |
| 12 | EE | Jingmin Zhou,
Mark Heckman,
Brennen Reynolds,
Adam Carlson,
Matt Bishop:
Modeling network intrusion detection alerts for correlation.
ACM Trans. Inf. Syst. Secur. 10(1): (2007) |
| 2000 |
| 11 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion detection inter-component adaptive negotiation.
Computer Networks 34(4): 605-621 (2000) |
| 1999 |
| 10 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation.
Recent Advances in Intrusion Detection 1999 |
| 1998 |
| 9 | EE | Mark Heckman,
Karl N. Levitt:
Applying the Composition Principle to Verify a Hierarchy of Security Servers.
HICSS (3) 1998: 338-347 |
| 1997 |
| 8 | EE | Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Mark Heckman,
Karl N. Levitt,
Ronald A. Olsson:
Verification of a Distributed Computing.
HICSS (5) 1997: 252-261 |
| 1996 |
| 7 | | Mark Heckman,
Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Karl N. Levitt,
Ronald A. Olsson:
Towards Applying the Composition Principle to Verify a Microkernel Operating System.
TPHOLs 1996: 235-250 |
| 1995 |
| 6 | | Cui Zhang,
Brian R. Becker,
Mark Heckman,
Karl N. Levitt,
Ronald A. Olsson:
A Hierarchical Method for Reasoning about Distributed Programming Languages.
TPHOLs 1995: 385-400 |
| 1993 |
| 5 | | Cui Zhang,
Robert J. Shaw,
Ronald A. Olsson,
Karl N. Levitt,
Myla Archer,
Mark Heckman,
Gregory D. Benson:
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL.
HUG 1993: 29-42 |
| 1990 |
| 4 | EE | Teresa F. Lunt,
Dorothy E. Denning,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607 (1990) |
| 1987 |
| 3 | | Dorothy E. Denning,
Teresa F. Lunt,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
A Multilevel Relational Data Model.
IEEE Symposium on Security and Privacy 1987: 220-234 |
| 2 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
| 1986 |
| 1 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |