Carol Taylor

According to our database1, Carol Taylor authored at least 15 papers between 1994 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A new live video streaming approach based on Amazon S3 pricing model.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2013
Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation.
Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports, 2013

2011
Cyber defense competition: enhancing student competency in information security.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011

SIGCSE special project showcase.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

2008
Security education: a roadmap to the future.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

2006
The MILS architecture for high-assurance embedded systems.
Int. J. Embed. Syst., 2006

Challenging the anomaly detection paradigm: a provocative discussion.
Proceedings of the New Security Paradigms Workshop 2006, 2006

2005
Diversity as a computer defense mechanism.
Proceedings of the New Security Paradigms Workshop 2005, 2005

Diversity: the biological perspective position statement.
Proceedings of the New Security Paradigms Workshop 2005, 2005

2004
Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

A Multi-Layered Approach to Security in High Assurance Systems.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Attack Recognition for System Survivability: A Low-level Approach.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Assessing Power Substation Network Security and Survivability: A Work in Progress Report.
Proceedings of the International Conference on Security and Management, 2003

2002
An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

1994
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
Proceedings of the CCS '94, 1994


  Loading...