Michael Howard

Orcid: 0000-0001-5886-9233

According to our database1, Michael Howard authored at least 24 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluation of NoSQL in the Energy Marketplace with GraphQL Optimization.
CoRR, 2024

2023
Using health belief model and social media analytics to develop insights from hospital-generated twitter messaging and community responses on the COVID-19 pandemic.
J. Enterp. Inf. Manag., 2023

Inside the Windows Security Push: A Twenty-Year Retrospective.
IEEE Secur. Priv., 2023

ESP32: QEMU Emulation within a Docker Container.
CoRR, 2023

2022
Cloud Computing - Everything As A Service.
CoRR, 2022

Helm - What It Can Do and Where Is It Going?
CoRR, 2022

Terraform - Automating Infrastructure as a Service.
CoRR, 2022

2018
The evolution of the board interlock network following Sarbanes-Oxley.
Soc. Networks, 2018

2017
Artificial Intelligence Based Malware Analysis.
CoRR, 2017

Predicting signatures of future malware variants.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Probabilistic Modeling of Insider Threat Detection Systems.
Proceedings of the Graphical Models for Security - 4th International Workshop, 2017

Designing Visual Metaphors for an Educational Game for Parallel Programming.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2015
Lazy Factored Inference for Functional Probabilistic Programming.
CoRR, 2015

Ensemble prediction of vascular injury in Trauma care: Initial efforts towards data-driven, low-cost screening.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Identifying Shared Software Components to Support Malware Forensics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Hierarchical management of large-scale malware data.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2009
Managing the Security Wall of Data.
IEEE Secur. Priv., 2009

Improving Software Security by Eliminating the CWE Top 25 Vulnerabilities.
IEEE Secur. Priv., 2009

Variation and sensitivity in spectral thermal IR emissivity measurements.
Proceedings of the First Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2009

2008
Information Technology/Systems Offshore Outsourcing: Key Risks and Success Factors.
J. Inf. Technol. Res., 2008

Becoming a Security Expert.
IEEE Secur. Priv., 2008

2004
Building More Secure Software with Improved Development Processes.
IEEE Secur. Priv., 2004

2003
Inside the Windows Security Push.
IEEE Secur. Priv., 2003

1999
Bringing the Internet to All Electronic Devices.
Proceedings of the USENIX Workshop on Embedded Systems 1999, 1999


  Loading...