2008 |
23 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin,
Steffen Reidt,
Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
ESORICS 2008: 49-65 |
22 | | Meng-Da Wu,
Stephen D. Wolthusen:
Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms.
IMF 2008: 157-172 |
21 | | Thomas Richard McEvoy,
Stephen D. Wolthusen:
Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments.
IMF 2008: 55-72 |
20 | EE | Richard A. Kemmerer,
Roland Büschkes,
Ali Fessi,
Hartmut König,
Peter Herrmann,
Stephen D. Wolthusen,
Marko Jahnke,
Hervé Debar,
Ralph Holz,
Tanja Zseby,
Dirk Haage:
08102 Outcome Working Group -- Situational Awareness.
Network Attack Detection and Defense 2008 |
19 | EE | Stephen D. Wolthusen:
Editorial.
Computers & Security 27(1-2): 1 (2008) |
18 | EE | Stephen D. Wolthusen:
Editorial.
Computers & Security 27(3-4): 63 (2008) |
17 | EE | Stephen D. Wolthusen:
From the Editor-in-Chief.
Computers & Security 27(5-6): 123 (2008) |
16 | EE | Stephen D. Wolthusen:
Editorial.
Computers & Security 27(7-8): 233-234 (2008) |
2007 |
15 | EE | Nils Kalstad Svendsen,
Stephen D. Wolthusen:
Graph Models of Critical Infrastructure Interdependencies.
AIMS 2007: 208-211 |
14 | EE | Nils Kalstad Svendsen,
Stephen D. Wolthusen:
Multigraph Dependency Models for Heterogeneous Infrastructures.
Critical Infrastructure Protection 2007: 337-350 |
13 | EE | Stephen D. Wolthusen:
The Role of Mathematics in Information Security Education.
World Conference on Information Security Education 2007: 129-136 |
2006 |
12 | EE | Ole Martin Dahl,
Stephen D. Wolthusen:
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets.
IWIA 2006: 157-168 |
11 | EE | Erik Hjelmås,
Stephen D. Wolthusen:
Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs.
InfoSecCD 2006: 5-12 |
2005 |
10 | EE | Frank Graf,
Stephen D. Wolthusen:
A Capability-Based Transparent Cryptographic File System.
CW 2005: 101-108 |
9 | | Bernhard M. Hämmerli,
Stephen D. Wolthusen:
Critical (Information) Infrastructure Protection.
GI Jahrestagung (1) 2005: 466-467 |
8 | | Jaromir Likavec,
Stephen D. Wolthusen:
Enforcing Messaging Security Policies.
IWIA 2005: 131-138 |
2004 |
7 | | John L. Cole,
Stephen D. Wolthusen:
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA
IEEE Computer Society 2004 |
2003 |
6 | | John L. Cole,
Stephen D. Wolthusen:
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany
IEEE Computer Society 2003 |
5 | EE | Stephen D. Wolthusen:
Goalkeeper: Close-In Interface Protection.
ACSAC 2003: 334-341 |
4 | | Stephen D. Wolthusen:
A Distributed Multipurpose Mail Guard (Blinded).
IAW 2003: 268-275 |
2002 |
3 | | Stephen D. Wolthusen:
Access and Use Control using Externally Controlled Reference Monitors.
Operating Systems Review 36(1): 58-69 (2002) |
2001 |
2 | EE | Stephen D. Wolthusen:
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family.
ACSAC 2001: 55-63 |
1 | | E. Rademer,
Stephen D. Wolthusen:
Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.
Communications and Multimedia Security 2001 |