Mark A. Gondree

Affiliations:
  • Sonoma State University, Rohnert Park, Computer Science Department
  • Naval Postgraduate School, Monterey, Computer Science Department


According to our database1, Mark A. Gondree authored at least 19 papers between 2006 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing.
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017

Asset Criticality in Mission Reconfigurable Cyber Systems and its Contribution to Key Cyber Terrain.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Talking about Talking about Cybersecurity Games.
login Usenix Mag., 2016

The Outcomes of Cybersecurity Competitions and Implications for Underrepresented Populations.
IEEE Secur. Priv., 2016

2015
DEFY: A Deniable, Encrypted File System for Log-Structured Storage.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Teaching Industrial Control System Security Using Collaborative Projects.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

2014
Capturing Capture the Flag: Further Discussions.
login Usenix Mag., 2014

2013
Security through Play.
IEEE Secur. Priv., 2013

Valuing Security by Getting [d0x3d!]: Experiences with a Network Security Board Game.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

Towards a Cross-Domain MapReduce Framework.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Geolocation of data in the cloud.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2011
A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011

2009
Longest Common Subsequence as Private Search.
IACR Cryptol. ePrint Arch., 2009

Communication-Efficient Private Protocols for Longest Common Subsequence.
IACR Cryptol. ePrint Arch., 2009

MYSEA: the monterey security architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2007
Multi-Party Indirect Indexing and Applications.
IACR Cryptol. ePrint Arch., 2007

Fixing federal e-voting standards.
Commun. ACM, 2007

2006
Improved Efficiency for Private Stable Matching.
IACR Cryptol. ePrint Arch., 2006


  Loading...