Adrian Baldwin

According to our database1, Adrian Baldwin authored at least 27 papers between 1993 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation.
Proceedings of the 13th International Workshop on Automating Test Case Design, 2022

2021
Modelling Organizational Recovery.
Proceedings of the Simulation Tools and Techniques - 13th EAI International Conference, 2021

2020
Risk Management Framework for Machine Learning Security.
CoRR, 2020

2018
Exchangeability martingales for selecting features in anomaly detection.
Proceedings of the 7th Symposium on Conformal and Probabilistic Prediction and Applications, 2018

2017
Contagion in cyber security attacks.
J. Oper. Res. Soc., 2017

2012
Contagion in Cybersecurity Attacks.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

2011
Economic Methods and Decision Making by Security Professionals.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Economic Methods and Decision Making by Security Professionals.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Migration to Cloud as Real Option: Investment Decision under Uncertainty.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Assurance for federated identity management.
J. Comput. Secur., 2010

2009
Providing secure services for a virtual infrastructure.
ACM SIGOPS Oper. Syst. Rev., 2009

Using Modelling and Simulation for Policy Decision Support in Identity Management.
Proceedings of the POLICY 2009, 2009

2007
On identity assurance in the presence of federated identity management systems.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Model-based assurance of security controls.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2005
Enabling shared audit data.
Int. J. Inf. Sec., 2005

Trust Record: High-Level Assurance and Compliance.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Enhanced Accountability for Electronic Processes.
Proceedings of the Trust Management, Second International Conference, 2004

2003
Hardware Security Appliances for Trust.
Proceedings of the Trust Management, First International Conference, 2003

Hardware Encapsulation of Security Services.
Proceedings of the Computer Security, 2003

Towards Accountability for Electronic Patient Records.
Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 2003

2002
Encryption and Key management in a SAN.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Trust Services: A Framework for Service-Based Solutions.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2000
POWER prototype: towards integrated policy-based management.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

1998
Towards a More Complete Model of Role.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998

1993
The role of connectionist representations in necessary inference for natural language processing.
PhD thesis, 1993


  Loading...