Follow
Jim Alves-Foss
Jim Alves-Foss
Director, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of Idaho
Verified email at uidaho.edu - Homepage
Title
Cited by
Cited by
Year
The MILS architecture for high-assurance embedded systems
J Alves-Foss, PW Oman, C Taylor, WS Harrison
International journal of embedded systems 2 (3-4), 239-247, 2006
2772006
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
C Taylor, J Alves-Foss
Proceedings of the 2001 workshop on New security paradigms, 89-96, 2001
1562001
Formal syntax and semantics of Java
J Alves-Foss
Springer Science & Business Media, 1999
1371999
The use of encrypted functions for mobile agent security
H Lee, J Alves-Foss, S Harrison
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
1242004
On preventing replay attacks on security protocols
S Malladi, J Alves-Foss, RB Heckendorn
International Conference on Security and Management, 77-83, 2002
1102002
Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening
C Taylor, A Krings, J Alves-Foss
Proc. ACM Workshop on Scientific Aspects of Cyber Terrorism,(SACT …, 2002
1002002
A multi-layered approach to security in high assurance systems
J Alves-Foss, C Taylor, P Oman
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
842004
An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups
J Alves-Foss
23rd National Information Systems Security Conference, 2000
682000
A communication–computation efficient group key algorithm for large and dynamic groups
S Zheng, D Manz, J Alves-Foss
Computer Networks 51 (1), 69-93, 2007
652007
An empirical analysis of nate: Network analysis of anomalous traffic events
C Taylor, J Alves-Foss
Proceedings of the 2002 workshop on New security paradigms, 18-26, 2002
572002
Assessing computer security vulnerability
J Alves-Foss, S Barbosa
ACM SIGOPS Operating Systems Review 29 (3), 3-13, 1995
571995
Guess what? Here is a new tool that finds some new guessing attacks
R Corin, S Malladi, J Alves-Foss, S Etalle
Workshop on Issues in the Theory of Security, 2003
542003
The mils architecture for a secure global information grid
WS Harrison, N Hanebutte, P Oman, J Alves-Foss
Crosstalk: The Journal of Defense Software Engineering 18 (10), 20-24, 2005
522005
The darpa cyber grand challenge: A competitor's perspective
J Song, J Alves-Foss
IEEE Security & Privacy 13 (6), 72-76, 2015
512015
Covert timing channel analysis of rate monotonic real-time scheduling algorithm in mls systems
J Son
2006 IEEE Information Assurance Workshop, 361-368, 2006
472006
Securing database as a service: Issues and compromises
J Weis, J Alves-Foss
IEEE Security & Privacy 9 (6), 49-55, 2011
452011
Quantum evolutionary programming
B Rylander, T Soule, J Foster, J Alves-Foss
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO …, 2001
442001
Dynamic denotational semantics of Java
J Alves-Foss, FS Lam
Formal syntax and semantics of Java, 201-240, 2002
432002
Multi-protocol attacks and the public key infrastructure
J Alves-Foss
Proc. 21st National Information Systems Security Conference, 566-576, 1998
421998
Autonomous rule creation for intrusion detection
T Vollmer, J Alves-Foss, M Manic
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 1-8, 2011
402011
The system can't perform the operation now. Try again later.
Articles 1–20