Dan Geer

According to our database1, Dan Geer authored at least 124 papers between 1988 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Convergence.
IEEE Secur. Priv., 2021

Auto-Update Considered Harmful.
IEEE Secur. Priv., 2021

2020
For Good Measure: Counting Broken Links: A Quant's View of Software Supply Chain Security.
login Usenix Mag., 2020

Who Will Pay the Piper for Open Source Software Maintenance? Can We Increase Reliability as We Increase Reliance?
login Usenix Mag., 2020

For Good Measure: Security Measurement in the Present Tense.
login Usenix Mag., 2020

Security Theater, the Beat Goes On.
IEEE Secur. Priv., 2020

Averages don't characterise the heavy tails of ransoms.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
For Good Measure: Patent Activity as a Measure of Cybersecurity Innovation.
login Usenix Mag., 2019

For Good Measure: The Imperative of Reclaiming Metrics Terminology.
login Usenix Mag., 2019

For Good Measure: Is the Cloud Less Secure than On-Prem?
login Usenix Mag., 2019

For Good Measure: Curves of Error.
login Usenix Mag., 2019

Failure as Design.
IEEE Secur. Priv., 2019

Ownership.
IEEE Secur. Priv., 2019

Unknowable Unknowns.
IEEE Secur. Priv., 2019

2018
For Good Measure: Nameless Dread.
login Usenix Mag., 2018

For Good Measure: Remember the Recall.
login Usenix Mag., 2018

For Good Measure: Between a Block and a Hard Place.
login Usenix Mag., 2018

For Good Measure: Numbers Are Where You Find Them.
login Usenix Mag., 2018

You Are What You Eat.
IEEE Secur. Priv., 2018

Trading Places.
IEEE Secur. Priv., 2018

2017
Cybersecurity Workload Trends.
login Usenix Mag., 2017

For Good Measure: To Burn or Not to Burn.
login Usenix Mag., 2017

For Good Measure: Letting Go of the Steering Wheel.
login Usenix Mag., 2017

For Good Measure: When Opinion Is Data.
login Usenix Mag., 2017

Mutual Dependence Demands Mutual Sharing.
IEEE Secur. Priv., 2017

Attribution.
IEEE Secur. Priv., 2017

2016
For Good Measure: Implications of IoT.
login Usenix Mag., 2016

For Good Measure: Paradigm.
login Usenix Mag., 2016

For Good Measure: Five Years of Listening to Security Operations.
login Usenix Mag., 2016

For Good Measure: Betting on Growth versus Magnitude.
login Usenix Mag., 2016

Privacy's Paradigm.
IEEE Secur. Priv., 2016

Provenance.
IEEE Secur. Priv., 2016

2015
Balkanization from Above.
login Usenix Mag., 2015

For Good Measure: Much Ado about Metadata.
login Usenix Mag., 2015

For Good Measure: Why Speculate?
login Usenix Mag., 2015

For Good Measure: The Denominator.
login Usenix Mag., 2015

For Good Measure: The Undiscovered.
login Usenix Mag., 2015

For Good Measure: Cyberjobsecurity.
login Usenix Mag., 2015

Children of the Magenta.
IEEE Secur. Priv., 2015

The Right to Be Unobserved.
IEEE Secur. Priv., 2015

Less Is More: Saving the Internet from Itself.
IEEE Secur. Priv., 2015

2014
Margin of Safety or Speculation? Measuring Security Book Value.
login Usenix Mag., 2014

Exploring with a Purpose.
login Usenix Mag., 2014

Almost Too Big to Fail.
login Usenix Mag., 2014

Measure Like You Meant It.
login Usenix Mag., 2014

For Good Measure: Stress Analysis.
login Usenix Mag., 2014

For Good Measure: Testing.
login Usenix Mag., 2014

Inviting More Heartbleed.
IEEE Secur. Priv., 2014

Personal Data and Government Surveillance.
IEEE Secur. Priv., 2014

Polarization.
IEEE Secur. Priv., 2014

2013
For Good Measure: Security Debt.
login Usenix Mag., 2013

Measuring vs. Modeling.
login Usenix Mag., 2013

For Good Measure: Trending North.
login Usenix Mag., 2013

For Good Measure: The Price of Anything Is the Foregone Alternative.
login Usenix Mag., 2013

The Times, They Are a Changin'.
IEEE Secur. Priv., 2013

On Abandonment.
IEEE Secur. Priv., 2013

Identity as Privacy.
IEEE Secur. Priv., 2013

Resolved: the internet is no place for critical infrastructure.
Commun. ACM, 2013

2012
The Future of Security Nominal Delivery Draft, Rocky Mountain Information Security Conference, 18 May 2012.
login Usenix Mag., 2012

The Future of Security: Criticality, Rejectionists, Risk Tolerance.
login Usenix Mag., 2012

ICS Update.
IEEE Secur. Priv., 2012

Progress Is Infectious.
IEEE Secur. Priv., 2012

Are You Smarter than the TSA? (Hint: No).
IEEE Secur. Priv., 2012

Stand Your Ground.
IEEE Secur. Priv., 2012

Risk Aversion.
IEEE Secur. Priv., 2012

Numbers Worth Having.
IEEE Secur. Priv., 2012

Power. Law.
IEEE Secur. Priv., 2012

2011
When $80 Billion Is Not Enough.
IEEE Secur. Priv., 2011

Small Is Beautiful, Big Is Inevitable.
IEEE Secur. Priv., 2011

Eisenhower Revisited.
IEEE Secur. Priv., 2011

Attack Surface Inflation.
IEEE Secur. Priv., 2011

New Measures.
IEEE Secur. Priv., 2011

Correlation Is Not Causation.
IEEE Secur. Priv., 2011

A Time for Choosing.
IEEE Secur. Priv., 2011

Does a Rising Tide Lift All Boats?
IEEE Secur. Priv., 2011

2010
Vulnerable Compliance.
login Usenix Mag., 2010

Nothing Ventured, Nothing Gained.
IEEE Secur. Priv., 2010

A Life Is Short, a Half-Life Is Forever.
IEEE Secur. Priv., 2010

An Index of Cybersecurity.
IEEE Secur. Priv., 2010

A Time to Rethink.
IEEE Secur. Priv., 2010

Fratricide.
IEEE Secur. Priv., 2010

2009
Patch Grief with Proverbs.
IEEE Secur. Priv., 2009

Risk Concentration.
IEEE Secur. Priv., 2009

A Doubt of the Benefit.
IEEE Secur. Priv., 2009

Hard Data Is Good to Find.
IEEE Secur. Priv., 2009

The 0wned Price Index.
IEEE Secur. Priv., 2009

Deskilling Digital Security.
IEEE Secur. Priv., 2009

Digital Endosymbiosis.
IEEE Secur. Priv., 2009

2008
2008 USENIX Nominating Committee Report.
login Usenix Mag., 2008

Security Is a Subset of Reliability.
IEEE Secur. Priv., 2008

Type II Reverse Engineering [For Good Measure].
IEEE Secur. Priv., 2008

Strong Attractors.
IEEE Secur. Priv., 2008

Beware the IDs of March.
IEEE Secur. Priv., 2008

What We Got for Christmas.
IEEE Secur. Priv., 2008

Complexity Is the Enemy.
IEEE Secur. Priv., 2008

Learn by Analogy or Die Trying.
IEEE Secur. Priv., 2008

2007
A Quant Looks at the Future.
login Usenix Mag., 2007

The evolution of security.
ACM Queue, 2007

The End of Black and White.
IEEE Secur. Priv., 2007

2006
Playing for keeps.
ACM Queue, 2006

Evidently Evidentiary.
IEEE Secur. Priv., 2006

2005
Monoculture on the Back of the Envelope.
login Usenix Mag., 2005

When Is a Product a Security Product?
IEEE Secur. Priv., 2005

The Problem Statement is the Problem.
IEEE Secur. Priv., 2005

2004
Metrics, Economics, and Shared Risk at the National Scale.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

2003
Patch Work.
login Usenix Mag., 2003

Getting the Problem Statement Right.
login Usenix Mag., 2003

Comments of the National Strategy to Secure Cyberspace.
login Usenix Mag., 2003

Information Security: Why the Future Belongs to the Quants.
IEEE Secur. Priv., 2003

Monoculture.
IEEE Secur. Priv., 2003

Risk Management Is Still Where the Money Is.
Computer, 2003

2002
Split-and-Delegate: Threshold Cryptography for the Masses.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Penetration Testing: A Duet.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Information security is information risk management.
Proceedings of the New Security Paradigms Workshop 2001, 2001

2000
From the President.
login Usenix Mag., 2000

1998
Mobile Code Security.
IEEE Internet Comput., 1998

A Survey of Web Security.
Computer, 1998

1996
Kerberos with Clocks Adrift: History, Protocols, and Implementation.
Comput. Syst., 1996

1995
Kerberos Security with Clocks Adrift.
Proceedings of the 5th USENIX Security Symposium, 1995

1994
Breaking into Banks: Security Lessons Learned from Financial Services.
Proceedings of the 8th Conference on Systems Administration (LISA 1994), 1994

1991
Software and Intellectual Property - Who Owns Your Work?
Proceedings of the Summer 1991 USENIX Conference, Nashville, TE, USA, June 1991, 1991

1990
Project Athena as a Distributed Computer System.
Computer, 1990

1989
OLC: an on-line consulting system.
Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services, 1989

1988
The Athena Service Management System.
Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, 1988


  Loading...