Peter Mell

Orcid: 0000-0003-2938-897X

According to our database1, Peter Mell authored at least 36 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Empirical Validation of Automated Vulnerability Curation and Characterization.
IEEE Trans. Software Eng., 2023

2021
A Decade of Reoccurring Software Weaknesses.
IEEE Secur. Priv., 2021

The Generation of Security Scoring Systems Leveraging Human Expert Opinion.
CoRR, 2021

A Historical and Statistical Studyof the Software Vulnerability Landscape.
CoRR, 2021

2020
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Measurements of the Most Significant Software Security Weaknesses.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement.
IACR Cryptol. ePrint Arch., 2019

Implementing a Protocol Native Managed Cryptocurrency.
CoRR, 2019

Augmenting Fiat Currency with an Integrated Managed Cryptocurrency.
CoRR, 2019

A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems.
CoRR, 2019

Blockchain Technology Overview.
CoRR, 2019

Smart Contract Federated Identity Management without Third Party Authentication Services.
Proceedings of the Open Identity Summit 2019, 2019

2018
Quantifying Information Exposure in Internet Routing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

2016
Measuring and Improving the Effectiveness of Defense-in-Depth Postures.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Evasion-resistant network scan detection.
Secur. Informatics, 2015

Defensive Resource Allocations with Security Chokepoints in IPv6 Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

On the Internet Connectivity in Africa.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

2014
Using Network Tainting to Bound the Scope of Network Ingress Attacks.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Limitations to threshold random walk scan detection and mitigating enhancements.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
What's Special about Cloud Security?
IT Prof., 2012

Big data technology and implications for security research.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012

2010
Intrusion Detection and Prevention Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

State of security readiness.
ACM Crossroads, 2010

2009
An analysis of CVSS version 2 vulnerability scoring.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

2008
Vulnerability scoring for security configuration settings.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Improving the Common Vulnerability Scoring System.
IET Inf. Secur., 2007

2006
Common Vulnerability Scoring System.
IEEE Secur. Priv., 2006

2004
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents.
J. Netw. Syst. Manag., 2004

2000
A denial-of-service resistant intrusion detection architecture.
Comput. Networks, 2000

1999
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999


  Loading...