Follow
Carl E. Landwehr
Carl E. Landwehr
University of Michigan, George Washington University and Independent Consultant
Verified email at gwu.edu - Homepage
Title
Cited by
Cited by
Year
Basic concepts and taxonomy of dependable and secure computing
A Avizienis, JC Laprie, B Randell, C Landwehr
IEEE transactions on dependable and secure computing 1 (1), 11-33, 2004
77972004
Basic concepts and taxonomy of dependable and secure computing
A Avizienis, JC Laprie, B Randell, C Landwehr
IEEE transactions on dependable and secure computing 1 (1), 11-33, 2004
77942004
A taxonomy of computer program security flaws
CE Landwehr, AR Bull, JP McDermott, WS Choi
ACM Computing Surveys (CSUR) 26 (3), 211-254, 1994
8451994
Formal models for computer security
CE Landwehr
ACM Computing Surveys (CSUR) 13 (3), 247-278, 1981
7881981
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing privacy enhancing technologies: International workshop on design …, 2001
5442001
A security model for military message systems
CE Landwehr, CL Heitmeyer, J McLean
ACM Transactions on Computer Systems (TOCS) 2 (3), 198-222, 1984
2611984
Computer security
CE Landwehr
International journal of information security 1 (1), 3-13, 2001
2332001
The best available technologies for computer security
CE Landwehr
Computer 16 (07), 86-100, 1983
1141983
On access checking in capability-based systems
RY Kain, CE Landwehr
IEEE Transactions on Software Engineering, 202-207, 1987
911987
On access checking in capability-based systems
RY Kain, CE Landwehr
IEEE Transactions on Software Engineering, 202-207, 1987
911987
Does open source improve system security?
B Witten, C Landwehr, M Caloyannides
IEEE Software 18 (5), 57-61, 2001
862001
Security issues in networks with Internet access
CE Landwehr, DM Goldschlag
Proceedings of the IEEE 85 (12), 2034-2051, 1997
861997
Avoiding the top 10 software security design flaws
I Arce, K Clark-Fisher, N Daswani, J DelGrosso, D Dhillon, C Kern, ...
IEEE Computer Society Center for Secure Design (CSD), Tech. Rep, 2014
712014
Perspectives on the SolarWinds incident
S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ...
IEEE Security & Privacy 19 (2), 7-13, 2021
692021
Privacy and cybersecurity: The next 100 years
C Landwehr, D Boneh, JC Mitchell, SM Bellovin, S Landau, ME Lesk
Proceedings of the IEEE 100 (Special Centennial Issue), 1659-1673, 2012
462012
A taxonomy of computer program security flaws, with examples
CE Landwehr, AR Bull, JP McDermott, WS Choi
NRL Report (forthcoming), Naval Research Laboratory, Washington DC, 1993
451993
Cybersecurity and artificial intelligence: From fixing the plumbing to smart water
CE Landwehr
ieee seCurity & PrivaCy 6 (5), 3-4, 2008
44*2008
ÆtherFlow: Principled wireless support in SDN
M Yan, J Casey, P Shome, A Sprintson, A Sutton
2015 IEEE 23rd International Conference on Network Protocols (ICNP), 432-437, 2015
402015
Security analytics and measurements
G Cybenko, CE Landwehr
IEEE Security & Privacy 10 (3), 5-8, 2012
352012
Protecting unattended computers without software
CE Landwehr
Proceedings 13th Annual Computer Security Applications Conference, 274-283, 1997
321997
The system can't perform the operation now. Try again later.
Articles 1–20