Follow
Jim Alves-Foss
Jim Alves-Foss
Director, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of Idaho
Verified email at uidaho.edu - Homepage
Title
Cited by
Cited by
Year
The MILS architecture for high-assurance embedded systems
J Alves-Foss, PW Oman, C Taylor, WS Harrison
International journal of embedded systems 2 (3-4), 239-247, 2006
2842006
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
C Taylor, J Alves-Foss
Proceedings of the 2001 workshop on New security paradigms, 89-96, 2001
1542001
Formal syntax and semantics of Java
J Alves-Foss
Springer, 2003
1382003
The use of encrypted functions for mobile agent security
H Lee, J Alves-Foss, S Harrison
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
1242004
On preventing replay attacks on security protocols
S Malladi, J Alves-Foss, RB Heckendorn
International Conference on Security and Management, 77-83, 2002
1142002
Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening
C Taylor, A Krings, J Alves-Foss
Proc. ACM Workshop on Scientific Aspects of Cyber Terrorism,(SACT …, 2002
1032002
A multi-layered approach to security in high assurance systems
J Alves-Foss, C Taylor, P Oman
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
842004
An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups
J Alves-Foss
23rd National Information Systems Security Conference, 2000
692000
A communication–computation efficient group key algorithm for large and dynamic groups
S Zheng, D Manz, J Alves-Foss
Computer Networks 51 (1), 69-93, 2007
662007
An empirical analysis of nate: Network analysis of anomalous traffic events
C Taylor, J Alves-Foss
Proceedings of the 2002 workshop on New security paradigms, 18-26, 2002
572002
Assessing computer security vulnerability
J Alves-Foss, S Barbosa
ACM SIGOPS Operating Systems Review 29 (3), 3-13, 1995
571995
The darpa cyber grand challenge: A competitor's perspective
J Song, J Alves-Foss
IEEE Security & Privacy 13 (6), 72-76, 2015
552015
Guess what? Here is a new tool that finds some new guessing attacks
R Corin, S Malladi, J Alves-Foss, S Etalle
Workshop on Issues in the Theory of Security, 2003
542003
The mils architecture for a secure global information grid
WS Harrison, N Hanebutte, P Oman, J Alves-Foss
Crosstalk: The Journal of Defense Software Engineering 18 (10), 20-24, 2005
522005
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in mls systems
J Son
2006 IEEE Information Assurance Workshop, 361-368, 2006
482006
Quantum evolutionary programming
B Rylander, T Soule, J Foster, J Alves-Foss
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO …, 2001
472001
Securing database as a service: Issues and compromises
J Weis, J Alves-Foss
IEEE Security & Privacy 9 (6), 49-55, 2011
462011
Autonomous rule creation for intrusion detection
T Vollmer, J Alves-Foss, M Manic
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2011
442011
Dynamic denotational semantics of Java
J Alves-Foss, FS Lam
Formal syntax and semantics of Java, 201-240, 2002
432002
Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack
DC De Leon, J Alves-Foss, A Krings, P Oman
ACM Workshop on Scientific Aspects of Cyber Terrorism,(SACT), 2002
422002
The system can't perform the operation now. Try again later.
Articles 1–20