2009 |
161 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 34(1): 17-26 (2009) |
160 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 34(2): 15-24 (2009) |
159 | EE | Peter G. Neumann:
Inside risks - U.S. election after-math.
Commun. ACM 52(2): 29 (2009) |
2008 |
158 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 11(1): (2008) |
157 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(2): 18-28 (2008) |
156 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(3): 17-28 (2008) |
155 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(4): 17-26 (2008) |
154 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(5): (2008) |
153 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(6): 15-24 (2008) |
152 | EE | Peter G. Neumann:
Reflections on computer-related risks.
Commun. ACM 51(1): 78-80 (2008) |
151 | EE | Jim Horning,
Peter G. Neumann:
Risks of neglecting infrastructure.
Commun. ACM 51(6): 112 (2008) |
2007 |
150 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(1): 15-20 (2007) |
149 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(2): 18-23 (2007) |
148 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(3): 20-24 (2007) |
147 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(4): 20-29 (2007) |
146 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(5): 17-25 (2007) |
145 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(6): 20-27 (2007) |
144 | | Peter G. Neumann:
Reflections on systems trustworthiness.
Advances in Computers 70: 269-310 (2007) |
143 | EE | Herbert S. Lin,
Alfred Z. Spector,
Peter G. Neumann,
Seymour E. Goodman:
Toward a safer and more secure cyberspace.
Commun. ACM 50(10): 128 (2007) |
142 | EE | Steven M. Bellovin,
Matt Blaze,
Whitfield Diffie,
Susan Landau,
Jennifer Rexford,
Peter G. Neumann:
Internal surveillance, external risks.
Commun. ACM 50(12): 128 (2007) |
141 | EE | Peter G. Neumann:
Widespread network failures.
Commun. ACM 50(2): 112 (2007) |
140 | EE | Peter G. Neumann:
E-migrating risks?
Commun. ACM 50(9): 120 (2007) |
2006 |
139 | EE | Peter G. Neumann:
System and network trustworthiness in perspective.
ACM Conference on Computer and Communications Security 2006: 1-5 |
138 | EE | Peter G. Neumann:
Risks of Untrustworthiness.
ACSAC 2006: 321-328 |
137 | EE | Steven Fraser,
Gregor Kiczales,
Ricardo Lopez,
Peter G. Neumann,
Linda M. Northrop,
Martin C. Rinard,
Douglas C. Schmidt,
Kevin Sullivan:
The ultra challenge: software systems beyond big.
OOPSLA Companion 2006: 929-933 |
136 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(1): 14-19 (2006) |
135 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(2): 6-16 (2006) |
134 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(3): 17-24 (2006) |
133 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(4): 25-37 (2006) |
132 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(5): 16-21 (2006) |
131 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(6): 21-37 (2006) |
130 | EE | Peter G. Neumann:
Trustworthy systems revisited.
Commun. ACM 49(2): 152 (2006) |
129 | EE | Peter G. Neumann,
Lauren Weinstein:
Risks of RFID.
Commun. ACM 49(5): 136 (2006) |
128 | EE | Peter G. Neumann:
Risks relating to system compositions.
Commun. ACM 49(7): 120 (2006) |
127 | EE | Peter G. Neumann:
The foresight saga.
Commun. ACM 49(9): 112 (2006) |
2005 |
126 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 30(1): 9 (2005) |
125 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 30(1): 9-18 (2005) |
124 | EE | Peter G. Neumann:
Risks to the Public.
ACM SIGSOFT Software Engineering Notes 30(2): 17-25 (2005) |
123 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 30(3): 22-37 (2005) |
122 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 30(4): 19-35 (2005) |
121 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 30(6): 14-25 (2005) |
120 | EE | Peter G. Neumann:
Responsibilities of technologists.
Commun. ACM 48(2): 128 (2005) |
119 | EE | Peter G. Neumann:
Anticipating disasters.
Commun. ACM 48(3): 128 (2005) |
118 | EE | Peter G. Neumann,
Michael D. Byrne:
Disability-related risks.
Commun. ACM 48(8): 144 (2005) |
2004 |
117 | EE | Peter G. Neumann:
When Can Formal Methods Make a Real Difference?
ICFEM 2004: 12 |
116 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 29(2): 8-16 (2004) |
115 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 29(3): 7-14 (2004) |
114 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 29(5): 13-18 (2004) |
113 | EE | Peter G. Neumann:
Introduction.
Commun. ACM 47(10): 28-30 (2004) |
112 | EE | Peter G. Neumann:
Optimistic optimization.
Commun. ACM 47(6): 112 (2004) |
111 | EE | Peter G. Neumann:
The big picture.
Commun. ACM 47(9): 112 (2004) |
2003 |
110 | EE | Peter G. Neumann,
Richard J. Feiertag:
PSOS Revisited.
ACSAC 2003: 208-216 |
109 | | Peter G. Neumann:
Social and Technical Implications of Nonproprietary Software.
BSDCon 2003 |
108 | EE | Peter G. Neumann:
Achieving Principled Assuredly Trustworthy Composable Systems and Networks.
DISCEX (2) 2003: 182-187 |
107 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(2): 12-17 (2003) |
106 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(3): 5-9 (2003) |
105 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(4): 6-10 (2003) |
104 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(6): 6-14 (2003) |
103 | EE | Peter G. Neumann:
Information system security redux.
Commun. ACM 46(10): 136 (2003) |
102 | EE | Rebecca Mercuri,
Peter G. Neumann:
Security by obscurity.
Commun. ACM 46(11): 160 (2003) |
101 | EE | Peter G. Neumann:
Gambling on system accountability.
Commun. ACM 46(2): 120 (2003) |
100 | EE | Peter G. Neumann:
E-epistemology and misinformation.
Commun. ACM 46(5): 104 (2003) |
99 | EE | Peter G. Neumann:
Risks in trusting untrustworthiness.
Commun. ACM 46(9): 120 (2003) |
2001 |
98 | EE | Rebecca Mercuri,
Peter G. Neumann:
System integrity revisited.
Commun. ACM 44(1): 160 (2001) |
97 | | Lauren Weinstein,
Peter G. Neumann:
Inside Risks: Risks of Panic.
Commun. ACM 44(11): 152 (2001) |
96 | EE | Peter G. Neumann,
Lauren Weinstein:
Risks of National Identity Cards.
Commun. ACM 44(12): 176 (2001) |
95 | EE | Peter G. Neumann:
What to know about risks.
Commun. ACM 44(2): 136 (2001) |
94 | EE | Peter G. Neumann,
David Lorge Parnas:
Computers: boon or bane?
Commun. ACM 44(3): 168 (2001) |
2000 |
93 | EE | Peter G. Neumann:
Certitude and Rectitude.
ICRE 2000: 153 |
92 | EE | Peter G. Neumann:
Requirements-Related Risks in Critical Systems.
ICRE 2000: 3- |
91 | EE | Peter G. Neumann:
Robust Nonproprietary Software.
IEEE Symposium on Security and Privacy 2000: 122-123 |
90 | EE | Peter G. Neumann:
A Tale of Two Thousands.
Commun. ACM 43(3): 144 (2000) |
89 | EE | Peter G. Neumann:
Denial-of-Service Attacks.
Commun. ACM 43(4): 136 (2000) |
88 | EE | Lauren Weinstein,
Peter G. Neumann:
Internet Risks.
Commun. ACM 43(5): 144 (2000) |
87 | EE | Peter G. Neumann:
Risks in retrospect.
Commun. ACM 43(7): 144 (2000) |
86 | EE | Peter G. Neumann:
Missile defense.
Commun. ACM 43(9): 128 (2000) |
1999 |
85 | EE | Peter G. Neumann,
Phillip A. Porras:
Experience with EMERALD to Date.
Workshop on Intrusion Detection and Network Monitoring 1999: 73-80 |
84 | EE | Peter G. Neumann,
Lauren Weinstein:
Risks of Content Filtering.
Commun. ACM 42(11): 152 (1999) |
83 | EE | Peter G. Neumann:
Risks of Insiders.
Commun. ACM 42(12): 160 (1999) |
82 | EE | Peter G. Neumann:
Robust Open-Source Software.
Commun. ACM 42(2): 128 (1999) |
81 | EE | Peter G. Neumann,
Declan McCullagh:
Risks of Y2K.
Commun. ACM 42(6): 144 (1999) |
80 | EE | Peter G. Neumann:
Information is a Double-Edged Sword.
Commun. ACM 42(7): 120 (1999) |
79 | | Peter G. Neumann:
IC Online Exclusive Interview: Internet Security - Beyond Cryptography.
IEEE Internet Computing 3(2): 100 (1999) |
1998 |
78 | EE | Peter G. Neumann:
Protecting the Infrastructures.
Commun. ACM 41(1): 128 (1998) |
77 | | Peter G. Neumann:
Risks of E-Education.
Commun. ACM 41(10): 136 (1998) |
76 | | Peter G. Neumann:
Internet Gambling.
Commun. ACM 41(2): 112 (1998) |
75 | | Peter G. Neumann:
Are Computers Addictive?
Commun. ACM 41(3): 128 (1998) |
74 | EE | Peter G. Neumann:
Laptops in Congress?
Commun. ACM 41(7): 128 (1998) |
73 | | Peter G. Neumann:
Y2K Update.
Commun. ACM 41(9): 128 (1998) |
1997 |
72 | | Peter G. Neumann:
Security and Privacy Issues in Computer and Communication Systems.
The Computer Science and Engineering Handbook 1997: 1910-1913 |
71 | | Peter G. Neumann:
Integrity in Software Development.
Commun. ACM 40(10): 144 (1997) |
70 | | Peter G. Neumann:
System Development Woes.
Commun. ACM 40(12): 160 (1997) |
69 | | Peter G. Neumann:
Hopes for Fewer Risks?
Commun. ACM 40(2): 170 (1997) |
68 | | Peter G. Neumann:
The Big Picture.
Commun. ACM 40(5): 136 (1997) |
67 | | Peter G. Neumann,
Lauren Weinstein:
Spam, Spam, Spam!
Commun. ACM 40(6): 112 (1997) |
66 | | Peter G. Neumann:
Identity-Ralated Misuse.
Commun. ACM 40(7): 112 (1997) |
65 | | Peter G. Neumann:
Crypto Key Management.
Commun. ACM 40(8): 136 (1997) |
1996 |
64 | | Peter G. Neumann:
Risks in Digital Commerce.
Commun. ACM 39(1): 154 (1996) |
63 | | Peter G. Neumann:
Disinformation Theory.
Commun. ACM 39(10): 138 (1996) |
62 | | Peter G. Neumann:
Distributed Systems have Distributed Risks.
Commun. ACM 39(11): 130 (1996) |
61 | | Peter G. Neumann:
Risks of Anonymity.
Commun. ACM 39(12): 162 (1996) |
60 | | Peter G. Neumann,
Peter J. Denning:
W(h)ither Research and Education?
Commun. ACM 39(2): 154 (1996) |
59 | | Peter G. Neumann:
A Risks-related Bookshelf.
Commun. ACM 39(4): 122 (1996) |
58 | | Peter G. Neumann:
Linguistic Risks.
Commun. ACM 39(5): 154 (1996) |
57 | | Peter G. Neumann:
Using Formal Methods to Reduce Risks.
Commun. ACM 39(7): 114 (1996) |
1995 |
56 | EE | Peter G. Neumann:
Risks, Responsibilities, and the Future: Walking the Tightwire.
ACM Conference on Computer Science 1995: 257 |
55 | | Peter G. Neumann:
Reviewing the Risks Archives.
Commun. ACM 38(12): 138 (1995) |
54 | | Peter G. Neumann:
Reassessing the Crypto Debate.
Commun. ACM 38(3): 138 (1995) |
53 | | Peter G. Neumann:
Computer Vulnerabilities: Exploitation or Avoidance.
Commun. ACM 38(6): 138 (1995) |
52 | | Peter G. Neumann:
Risks of Easy Answers.
Commun. ACM 38(9): 130 (1995) |
1994 |
51 | | Peter G. Neumann:
Inside "Inside Risks".
Commun. ACM 37(12): 154 (1994) |
50 | | Peter G. Neumann:
Technology, Laws, and Society.
Commun. ACM 37(3): 138 (1994) |
49 | | Peter G. Neumann:
Risks of Passwords.
Commun. ACM 37(4): 126 (1994) |
48 | | Peter G. Neumann:
Alternative Passwords.
Commun. ACM 37(5): 146 (1994) |
47 | | Peter G. Neumann:
Risks on the Information Superhighway.
Commun. ACM 37(6): 114 (1994) |
46 | | Susan Landau,
Stephen T. Kent,
Clint Brooks,
Scott Charney,
Dorothy E. Denning,
Whitfield Diffie,
Anthony Lauck,
Douglas Miller,
Peter G. Neumann,
David Sobel:
Crypto Policy Perspectives.
Commun. ACM 37(8): 115-121 (1994) |
45 | | Peter G. Neumann:
Friendly Fire.
Commun. ACM 37(8): 138 (1994) |
44 | | Peter G. Neumann:
Expectations of Security and Privacy.
Commun. ACM 37(9): 138 (1994) |
1993 |
43 | | Peter G. Neumann:
Risks Considered Global(ly).
Commun. ACM 36(1): 154 (1993) |
42 | | Peter G. Neumann:
System Development Woes.
Commun. ACM 36(10): 146 (1993) |
41 | | Peter G. Neumann:
Are Dependable Systems Feasible?
Commun. ACM 36(2): 146 (1993) |
40 | | Peter G. Neumann:
Risks of Technology.
Commun. ACM 36(3): 130 (1993) |
39 | | Peter G. Neumann:
Using Names as Identifiers.
Commun. ACM 36(4): 154 (1993) |
38 | | Peter G. Neumann:
The Role of Software Engineering.
Commun. ACM 36(5): 114 (1993) |
37 | | Peter G. Neumann:
Modeling and Simulation.
Commun. ACM 36(6): 124 (1993) |
36 | | Peter G. Neumann:
Risks on the Rails.
Commun. ACM 36(7): 130 (1993) |
35 | | Peter G. Neumann:
Risks of Surveillance.
Commun. ACM 36(8): 122 (1993) |
34 | | Peter G. Neumann:
Animal Crackers.
Commun. ACM 36(9): 162 (1993) |
33 | EE | Nancy G. Leveson,
Peter G. Neumann:
Introduction to Special Issue on Software for Critical Systems.
IEEE Trans. Software Eng. 19(1): 1-2 (1993) |
1992 |
32 | | Peter G. Neumann:
Developing Complex Software for Critical Systems.
GI Jahrestagung 1992: 117-131 |
31 | | Peter G. Neumann:
What's in a Name?
Commun. ACM 35(1): 186 (1992) |
30 | | Peter G. Neumann:
Where to Place Trust.
Commun. ACM 35(10): 138 (1992) |
29 | | Peter G. Neumann:
Avoiding Weak Links.
Commun. ACM 35(12): 146 (1992) |
28 | | Peter G. Neumann:
Inside "Risks of Risks".
Commun. ACM 35(3): 160 (1992) |
27 | | Peter G. Neumann:
Survivable Systems.
Commun. ACM 35(5): 130 (1992) |
26 | | Peter G. Neumann:
Leap-Year Problems.
Commun. ACM 35(6): 162 (1992) |
25 | | Peter G. Neumann:
Aggravation by Computer: Life, Death, and Taxes.
Commun. ACM 35(7): 122 (1992) |
24 | | Peter G. Neumann:
Fraud by Computer.
Commun. ACM 35(8): 154 (1992) |
23 | | Peter G. Neumann:
Accidental Financial Losses.
Commun. ACM 35(9): 194 (1992) |
1991 |
22 | | Peter G. Neumann:
The Clock Grows at Midnight.
Commun. ACM 34(1): 170 (1991) |
21 | | Peter G. Neumann:
The Human Element.
Commun. ACM 34(11): 150 (1991) |
20 | | Peter G. Neumann:
Collaborative Effords.
Commun. ACM 34(12): 162 (1991) |
19 | | Peter G. Neumann:
Certifying Professionals.
Commun. ACM 34(2): 130 (1991) |
18 | | Peter G. Neumann:
Putting on Your Best Interface.
Commun. ACM 34(3): 138 (1991) |
17 | | Peter G. Neumann:
Interpreting (Mis)information.
Commun. ACM 34(4): 144 (1991) |
16 | | Peter G. Neumann:
Expecting the Unexpected Mayday.
Commun. ACM 34(5): 128 (1991) |
15 | | Peter G. Neumann:
Computers, Ethics, and Values.
Commun. ACM 34(7): 106 (1991) |
14 | | Peter G. Neumann:
The Not-So-Accidental Holist.
Commun. ACM 34(9): 122 (1991) |
1990 |
13 | | Peter G. Neumann:
Ghosts, Mysteries and Uncertainty.
Commun. ACM 33(10): 170 (1990) |
12 | | Peter G. Neumann:
Risks in Computerized Elections.
Commun. ACM 33(11): 170 (1990) |
11 | | Peter G. Neumann:
Some Reflections on a Telephone Switching Problem.
Commun. ACM 33(7): 154 (1990) |
10 | | Peter G. Neumann:
Insecurity about Security?
Commun. ACM 33(8): 170 (1990) |
9 | | Peter G. Neumann:
A Few Old Coincidences.
Commun. ACM 33(9): 202 (1990) |
1987 |
8 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
1986 |
7 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |
6 | | Peter G. Neumann:
On Hierarchical Design of Computer Systems for Critical Applications.
IEEE Trans. Software Eng. 12(9): 905-920 (1986) |
1984 |
5 | | Peter G. Neumann:
A Further View of the First Quarter Century, Introduction to the April 1984 Special Section.
Commun. ACM 27(4): 343 (1984) |
1976 |
4 | | Peter G. Neumann,
Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Software Development and Proofs of Multi-Level Security.
ICSE 1976: 421-428 |
1975 |
3 | | Peter G. Neumann,
T. R. N. Rao:
Error-Correcting Codes for Byte-Organized Arithmetic Processors.
IEEE Trans. Computers 24(3): 226-232 (1975) |
1974 |
2 | | Peter G. Neumann:
Toward a Methodology for Designing Large Systems and Verifying Their Properties.
GI Jahrestagung 1974: 52-67 |
1962 |
1 | | Peter G. Neumann:
A Note on Cyclic Permutation Error-Correcting Codes
Information and Control 5(1): 72-86 (1962) |