Coram, M. (2020). Anatomy of a Software Supply Chain Attack [Conference Presentation]. 10.2172/1825030
Publications
Search results
Jump to search filtersRivas, A., & Coram, M. (2019). Secure Software Development Practices at Sandia National Laboratories [Conference Poster]. https://www.osti.gov/biblio/1639986
Coram, M. (2019). Cross-Site Request Forgery Challenges and Solutions [Conference Poster]. https://www.osti.gov/biblio/1639993
Coram, M., Hymel, R., McDaniel, M., & Brotz, J.K. (2014). Key Management Strategies for Safeguards Authentication and Encryption [Presentation]. https://www.osti.gov/biblio/1502708
Coram, M., Hymel, R., Brotz, J.K., & McDaniel, M. (2014). Key Management Strategies for Safeguards Authentication and Encryption [Conference Poster]. https://www.osti.gov/biblio/1315244
Deland, S.M., Griego, R.M., Brotz, J.K., Coram, M., Fernandez, J.C., Bruskas, L.A., & Forden, G. (2013). Chain of Custody Backbone System Evaluation Experiments [Conference]. https://www.osti.gov/biblio/1106721
Deland, S.M., Griego, R.M., Brotz, J.K., Coram, M., Fernandez, J.C., Forden, G., & Bruskas, L.A. (2013). Chain of Custody Field Evaluations [Conference]. https://www.osti.gov/biblio/1115284
Brotz, J.K., Coram, M., & Thomas, M.A. (2013). Controlling Technical Diversity in Monitoring Regimes using the Secure Sensor Platform (Abstract only) [Conference]. https://www.osti.gov/biblio/1062907