Jim Alves-Foss

Affiliations: 
University of Idaho, Moscow, ID, United States 
Area:
Computer Science
Google:
"Jim Alves-Foss"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Jillepalli AA, Leon DCd, Steiner S, et al. (2018) Analysis of Web Browser Security Configuration Options Ksii Transactions On Internet and Information Systems. 12: 6139-6160
Yang X, Shi P, Sun H, et al. (2016) A fast boot, fast shutdown technique for android OS devices Computer. 49: 62-68
Song J, Alves-Foss J. (2016) Expanding RTEMS to a multiuser system by using security tags Communications in Computer and Information Science. 589: 3-18
Haltinner K, Sarathchandra D, Alves-Foss J, et al. (2016) Cyber security: Second international symposium, CSS 2015 coeur d’Alene, ID, USA, April 7-8, 2015 revised selected papers Communications in Computer and Information Science. 589
Alves-Foss J, Song J, Amack AS, et al. (2015) Evaluating the use of security tags in security policy enforcement mechanisms Proceedings of the Annual Hawaii International Conference On System Sciences. 2015: 5201-5210
Yang X, Alves-Foss J. (2013) Security policy refinement: High-level specification to low-level implementation Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 502-511
Rounds M, Pendegraft N, Alves-Foss J. (2013) An experimental study to explore attacker response to changes in security and reward Proceedings of the Annual Hawaii International Conference On System Sciences. 2969-2977
Song J, Alves-Foss J. (2013) Security tagging for a zero-kernel operating system Proceedings of the Annual Hawaii International Conference On System Sciences. 5049-5058
Lundeen B, Alves-Foss J. (2012) Practical clickjacking with BeEF 2012 Ieee International Conference On Technologies For Homeland Security, Hst 2012. 614-619
Weis J, Alves-Foss J. (2011) Securing database as a service: Issues and compromises Ieee Security and Privacy. 9: 49-55
See more...