Basic concepts and taxonomy of dependable and secure computing A Avizienis, JC Laprie, B Randell, C Landwehr IEEE transactions on dependable and secure computing 1 (1), 11-33, 2004 | 8053 | 2004 |
A taxonomy of computer program security flaws CE Landwehr, AR Bull, JP McDermott, WS Choi ACM Computing Surveys (CSUR) 26 (3), 211-254, 1994 | 859 | 1994 |
Formal models for computer security CE Landwehr ACM Computing Surveys (CSUR) 13 (3), 247-278, 1981 | 789 | 1981 |
Towards an analysis of onion routing security P Syverson, G Tsudik, M Reed, C Landwehr Designing privacy enhancing technologies: International workshop on design …, 2001 | 566 | 2001 |
A security model for military message systems CE Landwehr, CL Heitmeyer, J McLean ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984 | 266 | 1984 |
Computer security CE Landwehr International journal of information security 1 (1), 3-13, 2001 | 241 | 2001 |
The best available technologies for computer security CE Landwehr Computer 16 (07), 86-100, 1983 | 116 | 1983 |
On access checking in capability-based systems RY Kain, CE Landwehr IEEE Transactions on Software Engineering, 202-207, 1987 | 96 | 1987 |
Perspectives on the solarwinds incident S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ... IEEE Security & Privacy 19 (2), 7-13, 2021 | 90 | 2021 |
Does open source improve system security? B Witten, C Landwehr, M Caloyannides IEEE Software 18 (5), 57-61, 2001 | 90 | 2001 |
Security issues in networks with Internet access CE Landwehr, DM Goldschlag Proceedings of the IEEE 85 (12), 2034-2051, 1997 | 87 | 1997 |
Avoiding the top 10 software security design flaws I Arce, K Clark-Fisher, N Daswani, J DelGrosso, D Dhillon, C Kern, ... IEEE Computer Society Center for Secure Design (CSD), Tech. Rep, 2014 | 72 | 2014 |
Privacy and cybersecurity: The next 100 years C Landwehr, D Boneh, JC Mitchell, SM Bellovin, S Landau, ME Lesk Proceedings of the IEEE 100 (Special Centennial Issue), 1659-1673, 2012 | 48 | 2012 |
A taxonomy of computer program security flaws, with examples CE Landwehr, AR Bull, JP McDermott, WS Choi NRL Report (forthcoming), Naval Research Laboratory, Washington DC, 1993 | 46 | 1993 |
ÆtherFlow: Principled wireless support in SDN M Yan, J Casey, P Shome, A Sprintson, A Sutton 2015 IEEE 23rd International Conference on Network Protocols (ICNP), 432-437, 2015 | 41 | 2015 |
Security analytics and measurements G Cybenko, CE Landwehr IEEE Security & Privacy 10 (3), 5-8, 2012 | 41 | 2012 |
Protecting unattended computers without software CE Landwehr Proceedings 13th Annual Computer Security Applications Conference, 274-283, 1997 | 32 | 1997 |
Update Semantics for a Multilevel Relational Database System. TF Lunt, D Hsieh DBSec, 281-296, 1990 | 31 | 1990 |
Up scope CE Landwehr ieee seCurity & PrivaCy 6 (3), 3-4, 2008 | 30 | 2008 |
Mandatory Controls for Database Integrity. RS Sandhu DBSec, 143-150, 1989 | 29 | 1989 |