| 2009 |
| 161 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 34(1): 17-26 (2009) |
| 160 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 34(2): 15-24 (2009) |
| 159 | EE | Peter G. Neumann:
Inside risks - U.S. election after-math.
Commun. ACM 52(2): 29 (2009) |
| 2008 |
| 158 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 11(1): (2008) |
| 157 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(2): 18-28 (2008) |
| 156 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(3): 17-28 (2008) |
| 155 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(4): 17-26 (2008) |
| 154 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(5): (2008) |
| 153 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 33(6): 15-24 (2008) |
| 152 | EE | Peter G. Neumann:
Reflections on computer-related risks.
Commun. ACM 51(1): 78-80 (2008) |
| 151 | EE | Jim Horning,
Peter G. Neumann:
Risks of neglecting infrastructure.
Commun. ACM 51(6): 112 (2008) |
| 2007 |
| 150 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(1): 15-20 (2007) |
| 149 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(2): 18-23 (2007) |
| 148 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(3): 20-24 (2007) |
| 147 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(4): 20-29 (2007) |
| 146 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(5): 17-25 (2007) |
| 145 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 32(6): 20-27 (2007) |
| 144 | | Peter G. Neumann:
Reflections on systems trustworthiness.
Advances in Computers 70: 269-310 (2007) |
| 143 | EE | Herbert S. Lin,
Alfred Z. Spector,
Peter G. Neumann,
Seymour E. Goodman:
Toward a safer and more secure cyberspace.
Commun. ACM 50(10): 128 (2007) |
| 142 | EE | Steven M. Bellovin,
Matt Blaze,
Whitfield Diffie,
Susan Landau,
Jennifer Rexford,
Peter G. Neumann:
Internal surveillance, external risks.
Commun. ACM 50(12): 128 (2007) |
| 141 | EE | Peter G. Neumann:
Widespread network failures.
Commun. ACM 50(2): 112 (2007) |
| 140 | EE | Peter G. Neumann:
E-migrating risks?
Commun. ACM 50(9): 120 (2007) |
| 2006 |
| 139 | EE | Peter G. Neumann:
System and network trustworthiness in perspective.
ACM Conference on Computer and Communications Security 2006: 1-5 |
| 138 | EE | Peter G. Neumann:
Risks of Untrustworthiness.
ACSAC 2006: 321-328 |
| 137 | EE | Steven Fraser,
Gregor Kiczales,
Ricardo Lopez,
Peter G. Neumann,
Linda M. Northrop,
Martin C. Rinard,
Douglas C. Schmidt,
Kevin Sullivan:
The ultra challenge: software systems beyond big.
OOPSLA Companion 2006: 929-933 |
| 136 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(1): 14-19 (2006) |
| 135 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(2): 6-16 (2006) |
| 134 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(3): 17-24 (2006) |
| 133 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(4): 25-37 (2006) |
| 132 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(5): 16-21 (2006) |
| 131 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 31(6): 21-37 (2006) |
| 130 | EE | Peter G. Neumann:
Trustworthy systems revisited.
Commun. ACM 49(2): 152 (2006) |
| 129 | EE | Peter G. Neumann,
Lauren Weinstein:
Risks of RFID.
Commun. ACM 49(5): 136 (2006) |
| 128 | EE | Peter G. Neumann:
Risks relating to system compositions.
Commun. ACM 49(7): 120 (2006) |
| 127 | EE | Peter G. Neumann:
The foresight saga.
Commun. ACM 49(9): 112 (2006) |
| 2005 |
| 126 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 30(1): 9 (2005) |
| 125 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 30(1): 9-18 (2005) |
| 124 | EE | Peter G. Neumann:
Risks to the Public.
ACM SIGSOFT Software Engineering Notes 30(2): 17-25 (2005) |
| 123 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 30(3): 22-37 (2005) |
| 122 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 30(4): 19-35 (2005) |
| 121 | EE | Peter G. Neumann:
Risks to the public.
ACM SIGSOFT Software Engineering Notes 30(6): 14-25 (2005) |
| 120 | EE | Peter G. Neumann:
Responsibilities of technologists.
Commun. ACM 48(2): 128 (2005) |
| 119 | EE | Peter G. Neumann:
Anticipating disasters.
Commun. ACM 48(3): 128 (2005) |
| 118 | EE | Peter G. Neumann,
Michael D. Byrne:
Disability-related risks.
Commun. ACM 48(8): 144 (2005) |
| 2004 |
| 117 | EE | Peter G. Neumann:
When Can Formal Methods Make a Real Difference?
ICFEM 2004: 12 |
| 116 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 29(2): 8-16 (2004) |
| 115 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 29(3): 7-14 (2004) |
| 114 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 29(5): 13-18 (2004) |
| 113 | EE | Peter G. Neumann:
Introduction.
Commun. ACM 47(10): 28-30 (2004) |
| 112 | EE | Peter G. Neumann:
Optimistic optimization.
Commun. ACM 47(6): 112 (2004) |
| 111 | EE | Peter G. Neumann:
The big picture.
Commun. ACM 47(9): 112 (2004) |
| 2003 |
| 110 | EE | Peter G. Neumann,
Richard J. Feiertag:
PSOS Revisited.
ACSAC 2003: 208-216 |
| 109 | | Peter G. Neumann:
Social and Technical Implications of Nonproprietary Software.
BSDCon 2003 |
| 108 | EE | Peter G. Neumann:
Achieving Principled Assuredly Trustworthy Composable Systems and Networks.
DISCEX (2) 2003: 182-187 |
| 107 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(2): 12-17 (2003) |
| 106 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(3): 5-9 (2003) |
| 105 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(4): 6-10 (2003) |
| 104 | EE | Peter G. Neumann:
Risks to the public in computers and related systems.
ACM SIGSOFT Software Engineering Notes 28(6): 6-14 (2003) |
| 103 | EE | Peter G. Neumann:
Information system security redux.
Commun. ACM 46(10): 136 (2003) |
| 102 | EE | Rebecca Mercuri,
Peter G. Neumann:
Security by obscurity.
Commun. ACM 46(11): 160 (2003) |
| 101 | EE | Peter G. Neumann:
Gambling on system accountability.
Commun. ACM 46(2): 120 (2003) |
| 100 | EE | Peter G. Neumann:
E-epistemology and misinformation.
Commun. ACM 46(5): 104 (2003) |
| 99 | EE | Peter G. Neumann:
Risks in trusting untrustworthiness.
Commun. ACM 46(9): 120 (2003) |
| 2001 |
| 98 | EE | Rebecca Mercuri,
Peter G. Neumann:
System integrity revisited.
Commun. ACM 44(1): 160 (2001) |
| 97 | | Lauren Weinstein,
Peter G. Neumann:
Inside Risks: Risks of Panic.
Commun. ACM 44(11): 152 (2001) |
| 96 | EE | Peter G. Neumann,
Lauren Weinstein:
Risks of National Identity Cards.
Commun. ACM 44(12): 176 (2001) |
| 95 | EE | Peter G. Neumann:
What to know about risks.
Commun. ACM 44(2): 136 (2001) |
| 94 | EE | Peter G. Neumann,
David Lorge Parnas:
Computers: boon or bane?
Commun. ACM 44(3): 168 (2001) |
| 2000 |
| 93 | EE | Peter G. Neumann:
Certitude and Rectitude.
ICRE 2000: 153 |
| 92 | EE | Peter G. Neumann:
Requirements-Related Risks in Critical Systems.
ICRE 2000: 3- |
| 91 | EE | Peter G. Neumann:
Robust Nonproprietary Software.
IEEE Symposium on Security and Privacy 2000: 122-123 |
| 90 | EE | Peter G. Neumann:
A Tale of Two Thousands.
Commun. ACM 43(3): 144 (2000) |
| 89 | EE | Peter G. Neumann:
Denial-of-Service Attacks.
Commun. ACM 43(4): 136 (2000) |
| 88 | EE | Lauren Weinstein,
Peter G. Neumann:
Internet Risks.
Commun. ACM 43(5): 144 (2000) |
| 87 | EE | Peter G. Neumann:
Risks in retrospect.
Commun. ACM 43(7): 144 (2000) |
| 86 | EE | Peter G. Neumann:
Missile defense.
Commun. ACM 43(9): 128 (2000) |
| 1999 |
| 85 | EE | Peter G. Neumann,
Phillip A. Porras:
Experience with EMERALD to Date.
Workshop on Intrusion Detection and Network Monitoring 1999: 73-80 |
| 84 | EE | Peter G. Neumann,
Lauren Weinstein:
Risks of Content Filtering.
Commun. ACM 42(11): 152 (1999) |
| 83 | EE | Peter G. Neumann:
Risks of Insiders.
Commun. ACM 42(12): 160 (1999) |
| 82 | EE | Peter G. Neumann:
Robust Open-Source Software.
Commun. ACM 42(2): 128 (1999) |
| 81 | EE | Peter G. Neumann,
Declan McCullagh:
Risks of Y2K.
Commun. ACM 42(6): 144 (1999) |
| 80 | EE | Peter G. Neumann:
Information is a Double-Edged Sword.
Commun. ACM 42(7): 120 (1999) |
| 79 | | Peter G. Neumann:
IC Online Exclusive Interview: Internet Security - Beyond Cryptography.
IEEE Internet Computing 3(2): 100 (1999) |
| 1998 |
| 78 | EE | Peter G. Neumann:
Protecting the Infrastructures.
Commun. ACM 41(1): 128 (1998) |
| 77 | | Peter G. Neumann:
Risks of E-Education.
Commun. ACM 41(10): 136 (1998) |
| 76 | | Peter G. Neumann:
Internet Gambling.
Commun. ACM 41(2): 112 (1998) |
| 75 | | Peter G. Neumann:
Are Computers Addictive?
Commun. ACM 41(3): 128 (1998) |
| 74 | EE | Peter G. Neumann:
Laptops in Congress?
Commun. ACM 41(7): 128 (1998) |
| 73 | | Peter G. Neumann:
Y2K Update.
Commun. ACM 41(9): 128 (1998) |
| 1997 |
| 72 | | Peter G. Neumann:
Security and Privacy Issues in Computer and Communication Systems.
The Computer Science and Engineering Handbook 1997: 1910-1913 |
| 71 | | Peter G. Neumann:
Integrity in Software Development.
Commun. ACM 40(10): 144 (1997) |
| 70 | | Peter G. Neumann:
System Development Woes.
Commun. ACM 40(12): 160 (1997) |
| 69 | | Peter G. Neumann:
Hopes for Fewer Risks?
Commun. ACM 40(2): 170 (1997) |
| 68 | | Peter G. Neumann:
The Big Picture.
Commun. ACM 40(5): 136 (1997) |
| 67 | | Peter G. Neumann,
Lauren Weinstein:
Spam, Spam, Spam!
Commun. ACM 40(6): 112 (1997) |
| 66 | | Peter G. Neumann:
Identity-Ralated Misuse.
Commun. ACM 40(7): 112 (1997) |
| 65 | | Peter G. Neumann:
Crypto Key Management.
Commun. ACM 40(8): 136 (1997) |
| 1996 |
| 64 | | Peter G. Neumann:
Risks in Digital Commerce.
Commun. ACM 39(1): 154 (1996) |
| 63 | | Peter G. Neumann:
Disinformation Theory.
Commun. ACM 39(10): 138 (1996) |
| 62 | | Peter G. Neumann:
Distributed Systems have Distributed Risks.
Commun. ACM 39(11): 130 (1996) |
| 61 | | Peter G. Neumann:
Risks of Anonymity.
Commun. ACM 39(12): 162 (1996) |
| 60 | | Peter G. Neumann,
Peter J. Denning:
W(h)ither Research and Education?
Commun. ACM 39(2): 154 (1996) |
| 59 | | Peter G. Neumann:
A Risks-related Bookshelf.
Commun. ACM 39(4): 122 (1996) |
| 58 | | Peter G. Neumann:
Linguistic Risks.
Commun. ACM 39(5): 154 (1996) |
| 57 | | Peter G. Neumann:
Using Formal Methods to Reduce Risks.
Commun. ACM 39(7): 114 (1996) |
| 1995 |
| 56 | EE | Peter G. Neumann:
Risks, Responsibilities, and the Future: Walking the Tightwire.
ACM Conference on Computer Science 1995: 257 |
| 55 | | Peter G. Neumann:
Reviewing the Risks Archives.
Commun. ACM 38(12): 138 (1995) |
| 54 | | Peter G. Neumann:
Reassessing the Crypto Debate.
Commun. ACM 38(3): 138 (1995) |
| 53 | | Peter G. Neumann:
Computer Vulnerabilities: Exploitation or Avoidance.
Commun. ACM 38(6): 138 (1995) |
| 52 | | Peter G. Neumann:
Risks of Easy Answers.
Commun. ACM 38(9): 130 (1995) |
| 1994 |
| 51 | | Peter G. Neumann:
Inside "Inside Risks".
Commun. ACM 37(12): 154 (1994) |
| 50 | | Peter G. Neumann:
Technology, Laws, and Society.
Commun. ACM 37(3): 138 (1994) |
| 49 | | Peter G. Neumann:
Risks of Passwords.
Commun. ACM 37(4): 126 (1994) |
| 48 | | Peter G. Neumann:
Alternative Passwords.
Commun. ACM 37(5): 146 (1994) |
| 47 | | Peter G. Neumann:
Risks on the Information Superhighway.
Commun. ACM 37(6): 114 (1994) |
| 46 | | Susan Landau,
Stephen T. Kent,
Clint Brooks,
Scott Charney,
Dorothy E. Denning,
Whitfield Diffie,
Anthony Lauck,
Douglas Miller,
Peter G. Neumann,
David Sobel:
Crypto Policy Perspectives.
Commun. ACM 37(8): 115-121 (1994) |
| 45 | | Peter G. Neumann:
Friendly Fire.
Commun. ACM 37(8): 138 (1994) |
| 44 | | Peter G. Neumann:
Expectations of Security and Privacy.
Commun. ACM 37(9): 138 (1994) |
| 1993 |
| 43 | | Peter G. Neumann:
Risks Considered Global(ly).
Commun. ACM 36(1): 154 (1993) |
| 42 | | Peter G. Neumann:
System Development Woes.
Commun. ACM 36(10): 146 (1993) |
| 41 | | Peter G. Neumann:
Are Dependable Systems Feasible?
Commun. ACM 36(2): 146 (1993) |
| 40 | | Peter G. Neumann:
Risks of Technology.
Commun. ACM 36(3): 130 (1993) |
| 39 | | Peter G. Neumann:
Using Names as Identifiers.
Commun. ACM 36(4): 154 (1993) |
| 38 | | Peter G. Neumann:
The Role of Software Engineering.
Commun. ACM 36(5): 114 (1993) |
| 37 | | Peter G. Neumann:
Modeling and Simulation.
Commun. ACM 36(6): 124 (1993) |
| 36 | | Peter G. Neumann:
Risks on the Rails.
Commun. ACM 36(7): 130 (1993) |
| 35 | | Peter G. Neumann:
Risks of Surveillance.
Commun. ACM 36(8): 122 (1993) |
| 34 | | Peter G. Neumann:
Animal Crackers.
Commun. ACM 36(9): 162 (1993) |
| 33 | EE | Nancy G. Leveson,
Peter G. Neumann:
Introduction to Special Issue on Software for Critical Systems.
IEEE Trans. Software Eng. 19(1): 1-2 (1993) |
| 1992 |
| 32 | | Peter G. Neumann:
Developing Complex Software for Critical Systems.
GI Jahrestagung 1992: 117-131 |
| 31 | | Peter G. Neumann:
What's in a Name?
Commun. ACM 35(1): 186 (1992) |
| 30 | | Peter G. Neumann:
Where to Place Trust.
Commun. ACM 35(10): 138 (1992) |
| 29 | | Peter G. Neumann:
Avoiding Weak Links.
Commun. ACM 35(12): 146 (1992) |
| 28 | | Peter G. Neumann:
Inside "Risks of Risks".
Commun. ACM 35(3): 160 (1992) |
| 27 | | Peter G. Neumann:
Survivable Systems.
Commun. ACM 35(5): 130 (1992) |
| 26 | | Peter G. Neumann:
Leap-Year Problems.
Commun. ACM 35(6): 162 (1992) |
| 25 | | Peter G. Neumann:
Aggravation by Computer: Life, Death, and Taxes.
Commun. ACM 35(7): 122 (1992) |
| 24 | | Peter G. Neumann:
Fraud by Computer.
Commun. ACM 35(8): 154 (1992) |
| 23 | | Peter G. Neumann:
Accidental Financial Losses.
Commun. ACM 35(9): 194 (1992) |
| 1991 |
| 22 | | Peter G. Neumann:
The Clock Grows at Midnight.
Commun. ACM 34(1): 170 (1991) |
| 21 | | Peter G. Neumann:
The Human Element.
Commun. ACM 34(11): 150 (1991) |
| 20 | | Peter G. Neumann:
Collaborative Effords.
Commun. ACM 34(12): 162 (1991) |
| 19 | | Peter G. Neumann:
Certifying Professionals.
Commun. ACM 34(2): 130 (1991) |
| 18 | | Peter G. Neumann:
Putting on Your Best Interface.
Commun. ACM 34(3): 138 (1991) |
| 17 | | Peter G. Neumann:
Interpreting (Mis)information.
Commun. ACM 34(4): 144 (1991) |
| 16 | | Peter G. Neumann:
Expecting the Unexpected Mayday.
Commun. ACM 34(5): 128 (1991) |
| 15 | | Peter G. Neumann:
Computers, Ethics, and Values.
Commun. ACM 34(7): 106 (1991) |
| 14 | | Peter G. Neumann:
The Not-So-Accidental Holist.
Commun. ACM 34(9): 122 (1991) |
| 1990 |
| 13 | | Peter G. Neumann:
Ghosts, Mysteries and Uncertainty.
Commun. ACM 33(10): 170 (1990) |
| 12 | | Peter G. Neumann:
Risks in Computerized Elections.
Commun. ACM 33(11): 170 (1990) |
| 11 | | Peter G. Neumann:
Some Reflections on a Telephone Switching Problem.
Commun. ACM 33(7): 154 (1990) |
| 10 | | Peter G. Neumann:
Insecurity about Security?
Commun. ACM 33(8): 170 (1990) |
| 9 | | Peter G. Neumann:
A Few Old Coincidences.
Commun. ACM 33(9): 202 (1990) |
| 1987 |
| 8 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
| 1986 |
| 7 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |
| 6 | | Peter G. Neumann:
On Hierarchical Design of Computer Systems for Critical Applications.
IEEE Trans. Software Eng. 12(9): 905-920 (1986) |
| 1984 |
| 5 | | Peter G. Neumann:
A Further View of the First Quarter Century, Introduction to the April 1984 Special Section.
Commun. ACM 27(4): 343 (1984) |
| 1976 |
| 4 | | Peter G. Neumann,
Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Software Development and Proofs of Multi-Level Security.
ICSE 1976: 421-428 |
| 1975 |
| 3 | | Peter G. Neumann,
T. R. N. Rao:
Error-Correcting Codes for Byte-Organized Arithmetic Processors.
IEEE Trans. Computers 24(3): 226-232 (1975) |
| 1974 |
| 2 | | Peter G. Neumann:
Toward a Methodology for Designing Large Systems and Verifying Their Properties.
GI Jahrestagung 1974: 52-67 |
| 1962 |
| 1 | | Peter G. Neumann:
A Note on Cyclic Permutation Error-Correcting Codes
Information and Control 5(1): 72-86 (1962) |