James Bret Michael

Orcid: 0000-0003-3777-9858

Affiliations:
  • Naval Postgraduate School, Monterey, CA, USA


According to our database1, James Bret Michael authored at least 128 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Resilient Without Zero Trust.
Computer, January, 2024

Discovering Decision Manifolds to Assure Trusted Autonomous Systems.
CoRR, 2024

2023
There Is No Chilling When Your Control System Cybersecurity Is Unfulfilling.
Computer, December, 2023

Waterfall: Cascading Effects of a Strategic Cyber Campaign.
Computer, April, 2023

Software Engineering for Responsible AI.
Computer, April, 2023

Machine-Learned Verification and Advance Notice Oracles for Autonomous Systems.
Computer, 2023

2022
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence.
IEEE Secur. Priv., 2022

Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors.
Computer, 2022

Developing and Deploying Artificial Intelligence Systems.
Computer, 2022

Can You Trust Zero Trust?
Computer, 2022

Understanding Conversational Artificial Intelligence.
Computer, 2022

Placing Trust in Automated Software Development Processes.
Computer, 2022

Lightweight Verification and Validation of Cyberphysical Systems Using Machine-Learned Correctness Properties.
Computer, 2022

Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical Systems.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

2021
Lessons Learned From Applying the NIST Privacy Framework.
IT Prof., 2021

Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Security and Privacy for Edge Artificial Intelligence.
IEEE Secur. Priv., 2021

Struggling With Supply-Chain Security.
Computer, 2021

Improving the Trustworthiness of Software Through Rigorous Data Type Design.
Computer, 2021

Defensive AI: The Future Is Yesterday.
Computer, 2021

Formal Methods in Cyberphysical Systems.
Computer, 2021

Formal Verification of Cyberphysical Systems.
Computer, 2021

Trusting Human-Machine Teaming.
Computer, 2021

An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities.
Computer, 2021

Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks.
Computer, 2021

Multiagent Pathfinding Under Rigid, Optimization, and Uncertainty Constraints.
Computer, 2021

Hackathons 101.
Computer, 2021

Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks.
Proceedings of the 2021 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2021

2020
Practical Aspects of Employing Antireverse Engineering.
IT Prof., 2020

The Promise of Interactive Shared Augmented Reality.
Computer, 2020

Algorithms, Algorithms, Algorithms.
Computer, 2020

Security or Privacy: Can You Have Both?
Computer, 2020

Cyberthreats in 2025.
Computer, 2020

Open Questions in Formal Methods.
Computer, 2020

Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques With Blind Signatures.
Computer, 2020

Reducing Artifacts in GAN Audio Synthesis.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

2019
Trustworthiness of Autonomous Machines in Armed Conflict.
IEEE Secur. Priv., 2019

Security Through Simplicity: A Case Study in Logical Segmentation Inference.
Computer, 2019

Assessing the Trustworthiness of Electronic Systems.
Computer, 2019

2015
Trusted Computing: An Elusive Goal.
Computer, 2015

2014
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes.
IEEE Trans. Software Eng., 2014

2013
End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software.
IEEE Syst. J., 2013

Does Security Trump Reliability?
Computer, 2013

Empowering Users through Secure On-Demand Data Provisioning.
Computer, 2013

2012
The Mobile Software App Takeover.
IEEE Softw., 2012

Securing the ZigBee Protocol in the Smart Grid.
Computer, 2012

Atomic-Level Security for Web Applications in a Cloud Environment.
Computer, 2012

When Is a Cyberattack a Use of Force or an Armed Attack?
Computer, 2012

A Policy-Based Dialogue System for Physical Access Control.
Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, 2012

2011
Verification and Validation for Trustworthy Software Systems.
IEEE Softw., 2011

Flow-Specific Medium Access for Networked Satellite System.
IEEE Syst. J., 2011

Thoughts on Higher Education and Scientific Research.
IT Prof., 2011

A security and usability perspective of cloud file systems.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Rapid runtime system verification using automatic source code instrumentation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Putting order into the cloud: Object-oriented UML-based enforcement for document and application organization.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Cloud to cloud interoperability.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Formal validation and verification of space flight software using statechart-assertions and runtime execution monitoring.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Cloud Computing Support for Collaboration and Communication in Enterprise-Wide Workflow Processes.
Proceedings of the World Congress on Services, 2011

2010
Hazard Analysis and Validation Metrics Framework for System of Systems Software Safety.
IEEE Syst. J., 2010

Guest Editors' Introduction: Mobile Device Security.
IEEE Secur. Priv., 2010

Balancing Liberty, Stability, and Security.
IEEE Secur. Priv., 2010

From Chaos to Collective Defense.
Computer, 2010

Integrating Legal and Policy Factors in Cyberpreparedness.
Computer, 2010

A Nonlinear Perspective on Higher Education.
Computer, 2010

Goal-driven software reuse in the IV&V of system of systems.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Independent validation of software safety requirements for systems of systems.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Cloud Computing for Large-Scale Weapon Systems.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Removing the Boundaries: Steps Toward a Cloud Nirvana.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

2009
Architectural Patterns and Auto-Fusion Process for Automated Multisensor Fusion in SOA System-of-Systems.
IEEE Syst. J., 2009

Cyberpandemics: History, Inevitability, Response.
IEEE Secur. Priv., 2009

In Clouds Shall We Trust?
IEEE Secur. Priv., 2009

Cube-Type Algebraic Attacks on Wireless Encryption Protocols.
Computer, 2009

Passive Fingerprinting of Network Reconnaissance Tools.
Computer, 2009

Medium access for hybrid, large-scale wireless networks for missile defense.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

Statechart based formal modeling of workflow processes.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

Software reuse in the IV&V of system of systems.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

The verification and validation of software architecture for systems of systems.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

Standards interoperability: Applying software safety assurance standards to the evolution of legacy software.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

A Validation Metrics Framework for safety-critical software-intensive Systems.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

Using RuleML to specify cross-domain information flow control policies.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

Approaches for Measuring Software Project Management Effectiveness.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

2008
A Visual Tradeoff Space for Formal Verification and Validation Techniques.
IEEE Syst. J., 2008

A framework for computer-aided validation.
Innov. Syst. Softw. Eng., 2008

Are Governments Up to the Task?
IEEE Secur. Priv., 2008

A framework for software reuse in safety-critical system-of-systems.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

Interface hazard analysis for system of systems.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

Multistage security for hybrid, large-scale, mobile wireless sensor networks for missile defense.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

Integrating statechart assertions into Java components using AspectJ.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

Vulnerability Analysis of HD Photo Image Viewer Applications.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

2007
A Distributed Medium Access Control Protocol for Wireless Networks of Cooperative Radar Systems.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

Boost Phase Ballistic Missile Defense Using Multiple Hypothesis Tracking.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

A Hybrid, Large-scale Wireless Sensor Network for Missile Defense.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

A design pattern for using non-developmental items in real-time Java.
Proceedings of the 5th International Workshop on Java Technologies for Real-time and Embedded Systems, 2007

2006
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks.
Internet Res., 2006

Environment behavior models for automation of testing and assessment of system safety.
Inf. Softw. Technol., 2006

Pulse transmission scheduling for a distributed system of cooperative radars.
Proceedings of the 1st IEEE/SMC International Conference on System of Systems Engineering, 2006

Implementation and analysis of environment behavior models as a tool for testing real-time, reactive systems.
Proceedings of the 1st IEEE/SMC International Conference on System of Systems Engineering, 2006

2005
Environment behavior models for scenario generation and testing automation.
ACM SIGSOFT Softw. Eng. Notes, 2005

SPUTERS: An Integrated Traffic Surveillance and Emergency Response Architecture.
J. Intell. Transp. Syst., 2005

The Role of Policy in Balancing Outsourcing and Homeland Security.
IT Prof., 2005

Architectural framework for a system-of-systems.
Proceedings of the IEEE International Conference on Systems, 2005

Formal methods in a system-of-systems development.
Proceedings of the IEEE International Conference on Systems, 2005

Using attributed event grammar environment models for automated test generation and software risk assessment of system-of-systems.
Proceedings of the IEEE International Conference on Systems, 2005

Test Automation and Safety Assessment in Rapid Systems Prototyping.
Proceedings of the 16th IEEE International Workshop on Rapid System Prototyping (RSP 2005), 2005

An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Making Decisions about Legal Responses to Cyber Attacks.
Proceedings of the Advances in Digital Forensics, 2005

2004
Modeling and Simulation of System-of-Systems Timing Constraints with UML-RT and OMNeT++.
Proceedings of the 15th IEEE International Workshop on Rapid System Prototyping (RSP 2004), 2004

THEMIS: Threat Evaluation Metamodel for Information Systems.
Proceedings of the Intelligence and Security Informatics, 2004

2003
Quality management metrics for software development.
Inf. Manag., 2003

Lawful Cyber Decoy Policy.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

An Experiment in Software Decoy Design.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Network stream splitting for intrusion detection.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Experiments with Deceptive Software Responses to Buffer-Based Attacks.
Proceedings of the IEEE Systems, 2003

Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

Homeland Security's Cyber Component: A Survey of Legal Issues.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
A New Paradigm for Requirements Specification and Analysis of System-of-Systems.
Proceedings of the Radical Innovations of Software and Systems Engineering in the Future, 2002

Metrics for Measuring the Effectiveness of Software-Testing Tools.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

Security of runtime extensible virtual environments.
Proceedings of the 4th International Conference on Collaborative Virtual Environments 2002, Bonn, Germany, September 30, 2002

On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Natural-Language Processing Support for Developing Policy-Governed Software Systems.
Proceedings of the 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, 2001

2000
Trust Management in Distributed Databases.
Proceedings of the Data and Application Security, 2000

1999
Secure group management in large distributed systems: what is a group and what does it do?
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

1998
Capacity Analysis of Traffic Flow Over a Single-Lane Automated Highway System.
J. Intell. Transp. Syst., 1998

1993
The role of policy in requirements definition.
Proceedings of IEEE International Symposium on Requirements Engineering, 1993

Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

1992
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation.
Proceedings of the Database Security, 1992

1991
Use of an Experimental Policy Workbench: Description and Preliminary Results.
Proceedings of the Database Security, 1991


  Loading...