2007 |
21 | EE | Thomas W. Otani,
Mikhail Auguston,
Thomas S. Cook,
Doron Drusinsky,
James Bret Michael,
M. Shing:
A design pattern for using non-developmental items in real-time Java.
JTRES 2007: 135-143 |
2006 |
20 | | Leisheng Peng,
Duminda Wijesekera,
Thomas C. Wingfield,
James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks.
WOSIS 2006: 232-245 |
19 | EE | Mikhail Auguston,
James Bret Michael,
Man-tak Shing:
Environment behavior models for automation of testing and assessment of system safety.
Information & Software Technology 48(10): 971-980 (2006) |
2005 |
18 | EE | Mikhail Auguston,
James Bret Michael,
Man-tak Shing:
Environment behavior models for scenario generation and testing automation.
A-MOST 2005 |
17 | EE | Mikhail Auguston,
James Bret Michael,
Man-tak Shing:
Test Automation and Safety Assessment in Rapid Systems Prototyping.
IEEE International Workshop on Rapid System Prototyping 2005: 188-194 |
16 | | Leisheng Peng,
Thomas C. Wingfield,
Duminda Wijesekera,
Emily Frye,
Randall Jackson,
James Bret Michael:
Making Decisions about Legal Responses to Cyber Attacks.
IFIP Int. Conf. Digital Forensics 2005: 283-294 |
15 | EE | Duminda Wijesekera,
James Bret Michael,
Anil Nerode:
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy.
POLICY 2005: 115-118 |
14 | EE | Mikhail Auguston,
James Bret Michael,
Man-tak Shing:
Environment behavior models for scenario generation and testing automation.
ACM SIGSOFT Software Engineering Notes 30(4): 1-6 (2005) |
2004 |
13 | EE | James Bret Michael,
Man-tak Shing,
Michael H. Miklaski,
Joel D. Babbitt:
Modeling and Simulation of System-of-Systems Timing Constraints with UML-RT and OMNeT++.
IEEE International Workshop on Rapid System Prototyping 2004: 202-209 |
12 | | Csilla Farkas,
Thomas C. Wingfield,
James Bret Michael,
Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems.
ISI 2004: 307-321 |
2003 |
11 | EE | James Bret Michael,
Thomas C. Wingfield,
Steven E. Roberts:
Homeland Security's Cyber Component: A Survey of Legal Issues.
COMPSAC 2003: 24- |
10 | EE | James Bret Michael,
Thomas C. Wingfield,
Duminda Wijesekera:
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System.
COMPSAC 2003: 621-626 |
9 | | Donald P. Julian,
Neil C. Rowe,
James Bret Michael:
Experiments with Deceptive Software Responses to Buffer-Based Attacks.
IAW 2003: 43-44 |
8 | | James Bret Michael,
Georgios Fragkos,
Mikhail Auguston:
An Experiment in Software Decoy Design.
SEC 2003: 253-264 |
7 | | James Bret Michael,
Thomas C. Wingfield:
Lawful Cyber Decoy Policy.
SEC 2003: 483-488 |
2002 |
6 | EE | James Bret Michael:
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace.
COMPSAC 2002: 957-962 |
5 | EE | Ernesto J. Sallés,
James Bret Michael,
Michael V. Capps,
Don McGregor,
Andrzej Kapolka:
Security of runtime extensible virtual environments.
CVE 2002: 97-104 |
2001 |
4 | EE | James Bret Michael,
Vanessa L. Ong,
Neil C. Rowe:
Natural-Language Processing Support for Developing Policy-Governed Software Systems.
TOOLS (39) 2001: 263-275 |
2000 |
3 | | James Bret Michael,
Leonard T. Gaines:
Trust Management in Distributed Databases.
DBSec 2000: 329-338 |
1992 |
2 | | James Bret Michael,
Edgar H. Sibley,
Richard F. Baum,
Fu Li:
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation.
DBSec 1992: 367-386 |
1991 |
1 | | Edgar H. Sibley,
James Bret Michael,
Richard L. Wexelblat:
Use of an Experimental Policy Workbench: Description and Preliminary Results.
DBSec 1991: 47-76 |