2008 |
7 | EE | Carol Taylor,
Rose Shumba:
Security education: a roadmap to the future.
SIGCSE 2008: 459-460 |
2006 |
6 | EE | Carrie Gates,
Carol Taylor:
Challenging the anomaly detection paradigm: a provocative discussion.
NSPW 2006: 21-29 |
5 | EE | Jim Alves-Foss,
Paul W. Oman,
Carol Taylor,
Scott Harrison:
The MILS architecture for high-assurance embedded systems.
IJES 2(3/4): 239-247 (2006) |
2004 |
4 | EE | Jim Alves-Foss,
Carol Taylor,
Paul W. Oman:
A Multi-Layered Approach to Security in High Assurance Systems.
HICSS 2004 |
2003 |
3 | EE | Carol Taylor,
Jim Alves-Foss:
Attack Recognition for System Survivability: A Low-level Approach.
HICSS 2003: 335 |
2 | | Carol Taylor,
Paul W. Oman,
Axel W. Krings:
Assessing Power Substation Network Security and Survivability: A Work in Progress Report.
Security and Management 2003: 281-287 |
1994 |
1 | EE | Edward Amoroso,
Carol Taylor,
John Watson,
Jonathan Weiss:
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
ACM Conference on Computer and Communications Security 1994: 39-50 |