James Alves-Foss
Affiliations: | University of Idaho, Moscow, ID, United States |
Area:
Computer ScienceGoogle:
"James Alves-Foss"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Jillepalli AA, Leon DCd, Steiner S, et al. (2018) Analysis of Web Browser Security Configuration Options Ksii Transactions On Internet and Information Systems. 12: 6139-6160 |
Yang X, Shi P, Sun H, et al. (2016) A fast boot, fast shutdown technique for android OS devices Computer. 49: 62-68 |
Song J, Alves-Foss J. (2016) Expanding RTEMS to a multiuser system by using security tags Communications in Computer and Information Science. 589: 3-18 |
Haltinner K, Sarathchandra D, Alves-Foss J, et al. (2016) Cyber security: Second international symposium, CSS 2015 coeur d’Alene, ID, USA, April 7-8, 2015 revised selected papers Communications in Computer and Information Science. 589 |
Song J, Alves-Foss J. (2015) The DARPA cyber grand challenge: A competitor's perspective Ieee Security and Privacy. 13: 72-76 |
Alves-Foss J, Song J, Amack AS, et al. (2015) Evaluating the use of security tags in security policy enforcement mechanisms Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 5201-5210 |
Yang X, Alves-Foss J. (2013) Security policy refinement: High-level specification to low-level implementation Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 502-511 |
Song J, Alves-Foss J. (2013) Security tagging for a zero-kernel operating system Proceedings of the Annual Hawaii International Conference On System Sciences. 5049-5058 |
Lundeen B, Alves-Foss J. (2012) Practical clickjacking with BeEF 2012 Ieee International Conference On Technologies For Homeland Security, Hst 2012. 614-619 |
Weis J, Alves-Foss J. (2011) Securing database as a service: Issues and compromises Ieee Security and Privacy. 9: 49-55 |