Name
Papers
Collaborators
CARL E. LANDWEHR
57
54
Citations 
PageRank 
Referers 
2783
406.03
5826
Referees 
References 
291
206
Search Limit
1001000
Title
Citations
PageRank
Year
Autonomous vehicle safety: lessons from aviation00.342020
Software Systems Engineering programmes a capability approach.20.492017
Cybersecurity for Future Presidents: An Interdisciplinary Non-majors Course.00.342017
Privacy research directions.30.402016
How Can We Enable Privacy in an Age of Big Data Analytics?00.342016
We need a building code for building code.30.412015
Moving Target [Guest editors' introduction].00.342014
A building code for building code: putting what we know works to work20.702013
Prolog to the Section on Privacy and Cybersecurity.00.342012
Privacy and Cybersecurity: The Next 100 Years.30.402012
Security Analytics and Measurements120.682012
Sailing Away!00.342010
Drawing the Line10.392010
A National Goal for Cyberspace: Create an Open, Accountable Internet40.572009
Up Scope00.342008
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water10.402008
Cyber security and artificial intelligence: from fixing the plumbing to smart water30.442008
New Challenges for the New Year00.342007
Food for Thought: Improving the Market for Assurance00.342007
Revolution through Competition?00.342007
Speaking of Privacy10.412006
Overview of Cyber Security: A Crisis of Prioritization30.432005
Changing the Puzzle Pieces10.372005
Green Computing30.502005
Basic concepts and taxonomy of dependable and secure computing1936100.492004
Trusting strangers: Open source software and security00.342004
NSF Activities in Cyber Trust00.342003
Challenges and Recent Advances in Developing Trustworthy Software-Based Systems00.342003
From the Editor: Security Cosmology: Moving from Big Bang to Worlds in Collusion00.342003
Intrusion Tolerant Systems Workshop10.402002
Panel: The next generation of acess control models (panel session): do we need them and what should they be?00.342001
Computer security113.102001
A Security Model for Military Message Systems: Retrospective110.752001
Towards an analysis of onion routing security16120.622000
Protecting unattended computers without software121.291997
Security issues in networks with Internet access111.841997
Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 19942617.351994
A taxonomy of computer program security flaws19731.361994
Perspectives on Database Security - Panel Summary00.341994
Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 19932014.991994
Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 19922420.451993
Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 19912029.511992
IFIP WG 11.3 Database Security: Research Questions of Current Significance00.341992
Research Question List00.341990
Database Security, II: Status and Prospects, Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October, 198810.771989
Research Question List, Answers, and Revision00.341989
Database Security: Status and Prospects, Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, October 198710.771988
NRL invitational workshop on testing and proving: two approaches to assurance00.341986
Does program verification help?: how much?00.341985
Some lessons from formalizing a security model00.341985
  • 1
  • 2