D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 8,074 139 World Ranking 9520 National Ranking 4325

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer security
  • Operating system
  • Law

The scientist’s investigation covers issues in Computer security, Software security assurance, Software, Information security and Security testing. The concepts of his Computer security study are interwoven with issues in Extensibility and Security information and event management. His work in Software security assurance tackles topics such as Software construction which are related to areas like Software quality and System testing.

Many of his research projects under Software are closely connected to Reuse with Reuse, tying the diverse disciplines of science together. His Security testing study combines topics from a wide range of disciplines, such as System integration testing, Security through obscurity, Software engineering and Regression testing. His studies deal with areas such as Security service and Database security as well as Security through obscurity.

His most cited work include:

  • Software Security: Building Security In (477 citations)
  • Software security (365 citations)
  • Building Secure Software: How to Avoid Security Problems the Right Way (348 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Silver bullet, Software security assurance, Software and Information security. His work deals with themes such as Government, Risk management and Internet privacy, which intersect with Computer security. He combines subjects such as Security information and event management, Computer security model and Software development with his study of Software security assurance.

His Software study frequently draws connections between related disciplines such as Engineering management. His Security service study combines topics in areas such as Security through obscurity and Cloud computing security. Gary McGraw has researched Security through obscurity in several fields, including Logical security, Security engineering and Asset.

He most often published in these fields:

  • Computer security (64.49%)
  • Silver bullet (49.28%)
  • Software security assurance (36.96%)

What were the highlights of his more recent work (between 2014-2020)?

  • Silver bullet (49.28%)
  • Computer security (64.49%)
  • Software security assurance (36.96%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Silver bullet, Computer security, Software security assurance, Internet privacy and Cryptography. His work in the fields of Computer security, such as Information security, intersects with other areas such as Work. The Information security study combines topics in areas such as Security information and event management, Cloud computing security and Security management.

His work carried out in the field of Software security assurance brings together such families of science as Capability Maturity Model, Software bug, Space, State and Deep learning. His research in Capability Maturity Model intersects with topics in Network security policy, Security convergence, Security through obscurity, Computer security model and Asset. Gary McGraw interconnects Encryption and Public-key cryptography in the investigation of issues within Cryptography.

Between 2014 and 2020, his most popular works were:

  • Software security and the building security in maturity model (BSIMM) (6 citations)
  • Four Software Security Findings (6 citations)
  • Security Engineering for Machine Learning (3 citations)

In his most recent research, the most cited papers focused on:

  • Computer security
  • Operating system
  • Law

Computer security, Software security assurance, Artificial intelligence, Machine learning and Silver bullet are his primary areas of study. He carries out multidisciplinary research, doing studies in Computer security and Work. His research on Software security assurance concerns the broader Cloud computing security.

His studies in Artificial intelligence integrate themes in fields like Risk analysis, Data modeling, Risk analysis, Software architecture and Risk assessment. His Machine learning research includes elements of Training set, Security engineering and Taxonomy. His Capability Maturity Model study combines topics from a wide range of disciplines, such as Certified Information Security Manager, Security service, Information security, Information security audit and Asset.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Software Security: Building Security In

Gary McGraw.
(2006)

782 Citations

Software security

G. McGraw.
ieee symposium on security and privacy (2004)

603 Citations

ITS4: a static vulnerability scanner for C and C++ code

J. Viega;J.T. Bloch;Y. Kohno;G. McGraw.
annual computer security applications conference (2000)

574 Citations

Security as a new dimension in embedded system design

Paul Kocher;Ruby Lee;Gary McGraw;Anand Raghunathan.
design automation conference (2004)

565 Citations

Building Secure Software: How to Avoid Security Problems the Right Way

John Viega;Gary McGraw.
(2001)

536 Citations

Software fault injection: inoculating programs against errors

Jeffrey M. Voas;Gary McGraw.
(1997)

459 Citations

Static analysis for security

B. Chess;G. McGraw.
ieee symposium on security and privacy (2004)

446 Citations

Exploiting Software: How to Break Code

Greg Hoglund;Gary McGraw.
(2004)

389 Citations

Securing Java: getting down to business with mobile code

Gary McGraw;Edward W. Felten.
(1999)

354 Citations

Attacking Malicious Code: A Report to the Infosec Research Council

Gary McGraw;Greg Morrisett.
IEEE Software (2000)

353 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Gary McGraw

Laurie Williams

Laurie Williams

North Carolina State University

Publications: 53

Wouter Joosen

Wouter Joosen

KU Leuven

Publications: 19

Mike Papadakis

Mike Papadakis

University of Luxembourg

Publications: 14

Eduardo B. Fernandez

Eduardo B. Fernandez

Florida Atlantic University

Publications: 13

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 12

Yves Le Traon

Yves Le Traon

University of Luxembourg

Publications: 12

David Wagner

David Wagner

University of California, Berkeley

Publications: 12

Anand Raghunathan

Anand Raghunathan

Purdue University West Lafayette

Publications: 10

Niraj K. Jha

Niraj K. Jha

Princeton University

Publications: 10

Ruby B. Lee

Ruby B. Lee

Princeton University

Publications: 10

Diomidis Spinellis

Diomidis Spinellis

Athens University of Economics and Business

Publications: 9

Ralph E. Johnson

Ralph E. Johnson

University of Illinois at Urbana-Champaign

Publications: 9

Jan Jürjens

Jan Jürjens

University of Koblenz and Landau

Publications: 9

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 9

Ruth BREU

Ruth BREU

University of Innsbruck

Publications: 9

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 9

Trending Scientists

Antonio Capone

Antonio Capone

Polytechnic University of Milan

Rodolfo M. Nayga

Rodolfo M. Nayga

Texas A&M University

Xiao-Zi Yuan

Xiao-Zi Yuan

National Research Council Canada

Thomas Hellweg

Thomas Hellweg

Bielefeld University

Mae Sexauer Gustin

Mae Sexauer Gustin

University of Nevada, Reno

Jun Wang

Jun Wang

University of New South Wales

Michael Carey

Michael Carey

University of California, Los Angeles

Gilbert Di Paolo

Gilbert Di Paolo

Columbia University Medical Center

Stephen Curry

Stephen Curry

Imperial College London

Alan D. Salama

Alan D. Salama

University College London

Ruth S. Nussenzweig

Ruth S. Nussenzweig

New York University

Jukka M. Leppänen

Jukka M. Leppänen

University of Turku

Atsushi Senju

Atsushi Senju

Birkbeck, University of London

Vernon K. Sondak

Vernon K. Sondak

University of South Florida

Franz H. Messerli

Franz H. Messerli

University of Bern

Sean Pascoe

Sean Pascoe

Commonwealth Scientific and Industrial Research Organisation

Something went wrong. Please try again later.