James Riordan
James Riordan
MIT Lincoln Laboratory
Verified email at
Cited by
Cited by
Die PERSEUS Systemarchitektur
B Pfitzmann, J Riordan, C Stüble, M Waidner, A Weber
Verlässliche IT-Systeme 2001, 1-17, 2001
A game theoretic approach to strategy determination for dynamic platform defenses
KM Carter, JF Riordan, H Okhravi
Proceedings of the first ACM workshop on moving target defense, 21-30, 2014
A certified e-mail protocol
B Schneier, J Riordan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
Stateless methods for resource hiding and access control support based on URI encryption
C Giblin, T Pietraszek, J Riordan, CV Berghe
US Patent App. 10/991,580, 2006
Quantitative evaluation of dynamic platform techniques as a defensive mechanism
H Okhravi, J Riordan, K Carter
International Workshop on Recent Advances in Intrusion Detection, 405-425, 2014
Methods for operating virtual networks, data network system, computer program and computer program product
Y Duponchel, JF Riordan, R Rissmann, DM Zamboni
US Patent 7,908,350, 2011
Intrusion detection in data processing systems
A Dominique, JF Riordan, A Wespi
US Patent 7,568,228, 2009
Towards a taxonomy of intrusion detection systems and attacks
D Alessandri, C Cachin, M Dacier, O Deak, K Julisch, B Randell, ...
MAFTIA Deliverable D 3, 2001
Attack signature generation
K Julisch, J Riordan
US Patent App. 10/558,853, 2007
Continuous security metrics for prevalent network threats: introduction and first four metrics
RP Lippmann, JF Riordan, TH Yu, KK Watson
Massachusetts Inst of Tech Lexington Lincoln Lab, 2012
System, method and software for supplying activation information to a subsystem
JF Riordan, D Alessandri
US Patent 7,516,490, 2009
A vulnerability taxonomy methodology applied to web services
CV Berghe, J Riordan, F Piessens
Proceedings of the 10th Nordic Workshop on Secure IT Systems (NORDSEC2005 …, 2005
Access control for computers
J Riordan
US Patent 7,134,018, 2006
Towards automated cyber decision support: A case study on network segmentation for security
N Wagner, CŞ Şahin, M Winterrose, J Riordan, J Pena, D Hanson, ...
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-10, 2016
Configuration and usage pattern of a cloud environment based on iterative learning
HE Hockett, CM Laffoon, GV Paramkusham, K Rafferty, JC Riordan, ...
US Patent 10,389,586, 2019
Building and deploying billy goat, a worm detection system
J Riordan, D Zamboni, Y Duponchel
Proceedings of the 18th annual FIRST conference 2006 (23), 174, 2006
A certified e-mail protocol
J Riordan, B Schneier
13th Annual Computer Security Applications Conference, 100-106, 1998
Ember: a global perspective on extreme malicious behavior
T Yu, R Lippmann, J Riordan, S Boyer
Proceedings of the seventh international symposium on visualization for …, 2010
Threat-based risk assessment for enterprise networks
JF Riordan, RP Lippmann
MIT Lincoln Laboratory Lexington United States, 2016
Privacy and confidentiality preserving reporting of URLs
D Bourges-Waldegg, C Hoertnagl, JF Riordan
US Patent 8,271,424, 2012
The system can't perform the operation now. Try again later.
Articles 1–20