James Riordan
James Riordan
MIT Lincoln Laboratory
Verified email at
Cited by
Cited by
Die PERSEUS Systemarchitektur
B Pfitzmann, J Riordan, C Stüble, M Waidner, A Weber
Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 1-17, 2001
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of the first ACM workshop on moving target defense, 21-30, 2014
A certified e-mail protocol
B Schneier, J Riordan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
Stateless methods for resource hiding and access control support based on URI encryption
C Giblin, T Pietraszek, J Riordan, CV Berghe
US Patent App. 10/991,580, 2006
System, method and software for supplying activation information to a subsystem
JF Riordan, D Alessandri
US Patent 7,516,490, 2009
Methods for operating virtual networks, data network system, computer program and computer program product
Y Duponchel, JF Riordan, R Rissmann, DM Zamboni
US Patent 7,908,350, 2011
Quantitative evaluation of dynamic platform techniques as a defensive mechanism
H Okhravi, J Riordan, K Carter
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
Intrusion detection in data processing systems
A Dominique, JF Riordan, A Wespi
US Patent 7,568,228, 2009
Attack signature generation
K Julisch, J Riordan
US Patent App. 10/558,853, 2007
Towards a taxonomy of intrusion detection systems and attacks
D Alessandri, C Cachin, M Dacier, O Deak, K Julisch, B Randell, ...
Zurich, Switzerland: IBM Research Division, 2001
Continuous security metrics for prevalent network threats: introduction and first four metrics
RP Lippmann, JF Riordan, TH Yu, KK Watson
Lincoln Laboratory, MIT, 2012
Towards automated cyber decision support: A case study on network segmentation for security
N Wagner, CŞ Şahin, M Winterrose, J Riordan, J Pena, D Hanson, ...
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-10, 2016
A vulnerability taxonomy methodology applied to web services
CV Berghe, J Riordan, F Piessens
Proceedings of the 10th Nordic Workshop on Secure IT Systems (NORDSEC2005 …, 2005
Access control for computers
J Riordan
US Patent 7,134,018, 2006
Configuration and usage pattern of a cloud environment based on iterative learning
HE Hockett, CM Laffoon, GV Paramkusham, K Rafferty, JC Riordan, ...
US Patent 10,389,586, 2019
A certified e-mail protocol
J Riordan, B Schneier
13th Annual Computer Security Applications Conference, 100-106, 1998
Building and deploying billy goat, a worm detection system
J Riordan, D Zamboni, Y Duponchel
Proceedings of the 18th annual FIRST conference 2006 (23), 174, 2006
Quantifying the mission impact of network-level cyber defensive mitigations
N Wagner, CŞ Şahin, M Winterrose, J Riordan, D Hanson, J Peña, ...
The Journal of Defense Modeling and Simulation 14 (3), 201-216, 2017
Agent-based simulation for assessing network security risk due to unauthorized hardware
N Wagner, R Lippmann, M Winterrose, J Riordan, T Yu, WW Streilein
Proceedings of the Symposium on Agent-Directed Simulation, 18-26, 2015
Ember: a global perspective on extreme malicious behavior
T Yu, R Lippmann, J Riordan, S Boyer
Proceedings of the seventh international symposium on visualization for …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20