Matthew Elder
Matthew Elder
Johns Hopkins University Applied Physics Laboratory
Verified email at jhuapl.edu
Title
Cited by
Cited by
Year
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid malcode, 1-10, 2003
3362003
On computer viral infection and the effect of immunization
C Wang, JC Knight, MC Elder
Computer Security Applications, 2000. ACSAC'00. 16th Annual Conference, 246-256, 2000
2062000
Survivability Architectures: Issues and Approaches
C Wang, JC Knight, MC Elder, KJ Sullivan
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2000
98*2000
Survivability architectures: Issues and approaches
JC Knight, KJ Sullivan, MC Elder, C Wang
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 …, 2000
982000
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications …, 2009
902009
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
822002
Specifying user interfaces for safety-critical medical systems
M Elder, J Knight
Proc. of the 2nd Annual International Symposium on Medical Robotics and …, 1995
73*1995
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
612016
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
DARPA, Washington DC, 2002
512002
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
432014
The MEERKATS Cloud Security Architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International …, 2012
372012
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
372009
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
362002
Fault tolerance in critical information systems
MC Elder
VIRGINIA UNIV CHARLOTTESVILLE DEPT OF COMPUTER SCIENCE, 2001
272001
Error recovery in critical infrastructure systems
JC Knight, MC Elder, X Du
Computer Security, Dependability and Assurance: From Needs to Solutions …, 1998
231998
On viral propagation and the effect of immunization
C Wang, JC Knight, MC Elder
Proceedings of 16th ACM Annual Computer Applications Conference, 2000
222000
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans, MC Elder
Resilient Control Systems (ISRCS), 2013 6th International Symposium on, 150-155, 2013
202013
Method and apparatus for identifying invariants to detect software tampering
BT Witten, MC Elder
US Patent 8,108,931, 2012
192012
Security patterns template and tutorial
D Kienzle, M Elder, D Tyree, J Edwards-Hewitt
February, 2002
182002
Summaries of Four Critical Infrastructure Systems
J Knight, M Elder, J Flinn, P Marx
Technical Report CS-97-27, Department of Computer Science, University of …, 1997
131997
The system can't perform the operation now. Try again later.
Articles 1–20