| 2008 |
| 7 | EE | Carol Taylor,
Rose Shumba:
Security education: a roadmap to the future.
SIGCSE 2008: 459-460 |
| 2006 |
| 6 | EE | Carrie Gates,
Carol Taylor:
Challenging the anomaly detection paradigm: a provocative discussion.
NSPW 2006: 21-29 |
| 5 | EE | Jim Alves-Foss,
Paul W. Oman,
Carol Taylor,
Scott Harrison:
The MILS architecture for high-assurance embedded systems.
IJES 2(3/4): 239-247 (2006) |
| 2004 |
| 4 | EE | Jim Alves-Foss,
Carol Taylor,
Paul W. Oman:
A Multi-Layered Approach to Security in High Assurance Systems.
HICSS 2004 |
| 2003 |
| 3 | EE | Carol Taylor,
Jim Alves-Foss:
Attack Recognition for System Survivability: A Low-level Approach.
HICSS 2003: 335 |
| 2 | | Carol Taylor,
Paul W. Oman,
Axel W. Krings:
Assessing Power Substation Network Security and Survivability: A Work in Progress Report.
Security and Management 2003: 281-287 |
| 1994 |
| 1 | EE | Edward Amoroso,
Carol Taylor,
John Watson,
Jonathan Weiss:
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
ACM Conference on Computer and Communications Security 1994: 39-50 |