W. Michael Petullo

According to our database1, W. Michael Petullo authored at least 11 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Courses as Code: The Aquinas Learning System.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2020
The Industrial Age of Hacking.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
PivotWall: SDN-Based Information Flow Control.
Proceedings of the Symposium on SDN Research, 2018

2017
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
The Use of Cyber-Defense Exercises in Undergraduate Computing Education.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

Studying Naive Users and the Insider Threat with SimpleFlow.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Improving Application Security through TLS-Library Redesign.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

On the Generality and Convenience of Etypes.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

2014
Ethos' Deeply Integrated Distributed Types.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

2013
MinimaLT: Minimal-latency Networking Through Better Security.
IACR Cryptol. ePrint Arch., 2013

2011
Digital identity security architecture in Ethos.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011


  Loading...