default search action
Peter Mell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Peter Mell, Irena Bojanova, Carlos Eduardo Galhardo:
Measuring the Exploitation of Weaknesses in the Wild. IT Prof. 26(3): 14-21 (2024) - [i14]Peter Mell, Irena Bojanova, Carlos Cardoso Galhardo:
Measuring the Exploitation of Weaknesses in the Wild. CoRR abs/2405.01289 (2024) - 2023
- [j10]Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C. S. Santos, Danielle Gonzalez, Steven Simmons:
Empirical Validation of Automated Vulnerability Curation and Characterization. IEEE Trans. Software Eng. 49(5): 3241-3260 (2023) - 2021
- [j9]Assane Gueye, Carlos E. C. Galhardo, Irena Bojanova, Peter Mell:
A Decade of Reoccurring Software Weaknesses. IEEE Secur. Priv. 19(6): 74-82 (2021) - [i13]Assane Gueye, Peter Mell:
A Historical and Statistical Studyof the Software Vulnerability Landscape. CoRR abs/2102.01722 (2021) - [i12]Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye:
Measurements of the Most Significant Software Security Weaknesses. CoRR abs/2104.05375 (2021) - [i11]Peter Mell:
The Generation of Security Scoring Systems Leveraging Human Expert Opinion. CoRR abs/2105.13755 (2021) - 2020
- [c18]Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye:
Measurements of the Most Significant Software Security Weaknesses. ACSAC 2020: 154-164 - [c17]Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. COMPSAC 2020: 511-516 - [i10]Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. CoRR abs/2006.08524 (2020)
2010 – 2019
- 2019
- [c16]Peter Mell, Jim Dray, James M. Shook:
Smart Contract Federated Identity Management without Third Party Authentication Services. Open Identity Summit 2019: 37-48 - [i9]Peter Mell, John Kelsey, James M. Shook:
Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness. CoRR abs/1906.11011 (2019) - [i8]Peter Mell:
Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency. CoRR abs/1906.11042 (2019) - [i7]Peter Mell, Jim Dray, James M. Shook:
Smart Contract Federated Identity Management without Third Party Authentication Services. CoRR abs/1906.11057 (2019) - [i6]Peter Mell, Assane Gueye, Christopher Schanzle:
Quantifying Information Exposure in Internet Routing. CoRR abs/1906.11061 (2019) - [i5]Dylan Yaga, Peter Mell, Nik Roby, Karen Scarfone:
Blockchain Technology Overview. CoRR abs/1906.11078 (2019) - [i4]Loïc Lesavre, Priam Varin, Peter Mell, Michael Davidson, James M. Shook:
A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. CoRR abs/1908.00929 (2019) - [i3]Peter Mell:
Augmenting Fiat Currency with an Integrated Managed Cryptocurrency. CoRR abs/1912.06487 (2019) - [i2]Peter Mell, Aurélien Delaitre, Frederic J. de Vaulx, Philippe Dessauw:
Implementing a Protocol Native Managed Cryptocurrency. CoRR abs/1912.06491 (2019) - [i1]James M. Shook, Scott Simon, Peter Mell:
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement. IACR Cryptol. ePrint Arch. 2019: 541 (2019) - 2018
- [c15]Peter Mell:
Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency. TrustCom/BigDataSE 2018: 1287-1296 - [c14]Peter Mell, Assane Gueye, Christopher Schanzle:
Quantifying Information Exposure in Internet Routing. TrustCom/BigDataSE 2018: 1619-1623 - 2017
- [j8]Peter Mell, James M. Shook, Richard E. Harang, Serban I. Gavrila:
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 4-25 (2017) - [c13]Peter Mell, John Kelsey, James M. Shook:
Cryptocurrency Smart Contracts for Distributed Consensus of Public Randomness. SSS 2017: 410-425 - 2016
- [c12]Peter Mell, James M. Shook, Serban I. Gavrila:
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems. MIST@CCS 2016: 13-22 - [c11]Richard E. Harang, Peter Mell:
Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection. FPS 2016: 36-47 - [c10]Peter Mell, James M. Shook, Richard E. Harang:
Measuring and Improving the Effectiveness of Defense-in-Depth Postures. ICSS 2016: 15-22 - 2015
- [j7]Richard E. Harang, Peter Mell:
Evasion-resistant network scan detection. Secur. Informatics 4(1): 4 (2015) - [c9]Assane Gueye, Peter Mell, Désiré Bansé, Faical Y. Congo:
On the Internet Connectivity in Africa. AFRICOMM 2015: 70-77 - [c8]Assane Gueye, Peter Mell, Richard E. Harang, Richard J. La:
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks. DBSec 2015: 261-276 - 2014
- [c7]Peter Mell, Richard E. Harang:
Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks. MILCOM 2014: 192-197 - [c6]Peter Mell, Richard E. Harang:
Using Network Tainting to Bound the Scope of Network Ingress Attacks. SERE 2014: 206-215 - 2013
- [c5]Peter Mell, Richard E. Harang:
Limitations to threshold random walk scan detection and mitigating enhancements. CNS 2013: 332-340 - 2012
- [j6]Peter Mell:
What's Special about Cloud Security? IT Prof. 14(4): 6-8 (2012) - [c4]Peter Mell:
Big data technology and implications for security research. BADGERS@CCS 2012: 15-16 - 2010
- [j5]Ramaswamy Chandramouli, Peter Mell:
State of security readiness. ACM Crossroads 16(3): 23-25 (2010) - [p1]Karen Scarfone, Peter Mell:
Intrusion Detection and Prevention Systems. Handbook of Information and Communication Security 2010: 177-192
2000 – 2009
- 2009
- [c3]Karen Scarfone, Peter Mell:
An analysis of CVSS version 2 vulnerability scoring. ESEM 2009: 516-525 - 2008
- [c2]Karen Scarfone, Peter Mell:
Vulnerability scoring for security configuration settings. QoP 2008: 3-8 - 2007
- [j4]Peter Mell, Karen Scarfone:
Improving the Common Vulnerability Scoring System. IET Inf. Secur. 1(3): 119-127 (2007) - 2006
- [j3]Peter Mell, Karen Scarfone, Sasha Romanosky:
Common Vulnerability Scoring System. IEEE Secur. Priv. 4(6): 85-89 (2006) - 2004
- [j2]Donald G. Marks, Peter Mell, Michael Stinson:
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. J. Netw. Syst. Manag. 12(1): 95-110 (2004) - 2000
- [j1]Peter Mell, Donald G. Marks, Mark McLarnon:
A denial-of-service resistant intrusion detection architecture. Comput. Networks 34(4): 641-658 (2000)
1990 – 1999
- 1999
- [c1]Peter Mell, Mark McLarnon:
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. Recent Advances in Intrusion Detection 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint