To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing.[1] His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures.[2] He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security.[3] The final committee report is available through the Cyber Security and Policy Institute of the George Washington University,[4] and the building code through the IEEE.[5]

Carl Landwehr has developed and led cybersecurity research programs at the National Science Foundation (2001-2004, 2009–2011), IARPA (2005-2009), Mitretek Systems and the Naval Research Laboratory (1982-1999). From 2007 to 2010, he served as editor-in-chief of IEEE Security & Privacy Magazine[6] as well as associate editor of several IEEE journals. He was a member of DARPA's Information Science and Technology Study Group and has served on several studies for the National Academy of Sciences. Research begun while visiting at the Isaac Newton Institute at Cambridge eventually led to the development of a patent for a secure identification system held by Dr. Landwehr and Daniel Latham.[7] He is the author of several highly cited publications.

Carl Landwehr holds degrees from Yale University (BS) and the University of Michigan (MS, PhD).[8] While at Michigan, he worked for the Merit Network, currently the longest running regional computer network in the United States.[9] He has taught and lectured widely, including at Purdue University, Georgetown University, Virginia Tech University, and the University of Maryland.[10] He is currently a lead research scientist at the Cyber Security Policy and Research Institute at George Washington University. In 2015 and 2016, Dr. Landwehr was the visiting McDevitt Professor of Computer Science at the McDevitt Center for Creativity and Innovation of LeMoyne College to develop and teach an inter-disciplinary undergraduate course entitled "Cybersecurity for Future Presidents".[11] In 2019, he became a visiting professor in the Electrical and Computer Engineering Division of the University of Michigan in Ann Arbor. Dr. Landwehr joined the Board of Directors of the Center for Democracy and Technology in September 2016.[12]

Carl Landwehr was interviewed by Gary McGraw of Cigital for the Silver Bullet podcasts on Security for IEEE discussing changing threats in cybersecurity.[13] He has also been interviewed for the computer history series hosted by the Charles Babbage Institute of the University of Minnesota.[14] For the 30th Anniversary IEEE Symposium on Security and Privacy, he provided a history of U.S. Government investments in cyber security research.[15]

Dr. Landwehr is an IEEE Fellow (2013) and has received various awards, including the ACM SIGSAC's Outstanding Contribution Award (2013)[16] and the National Science Foundation Director's Award for Meritorious Service (2012). He was a member of the founding class (2012) inducted into the National Cyber Security Hall of Fame.[17][18]

YouTube Encyclopedic

  • 1/3
    Views:
    972
    331
    314
  • Silver Bullet's Dr. Gary McGraw chats with Dr. Carl Landwehr
  • Cybersecurity Seminar Series: Carl Landwehr
  • CSIAC Webinar - A Model-based Game Theoretic Approach for Mitigating Cyber Risk

Transcription

References

  1. ^ "Carl Landwehr becomes NSF Trustworthy Computing Director". Institute for Systems Research. 30 November 2009. Retrieved 5 January 2013.
  2. ^ "ACM Digital Library". ACM. 31 December 2013. Retrieved 5 June 2014.
  3. ^ "NSF Where Discoveries Begin". NSF. 25 August 2014. Retrieved 5 February 2015.
  4. ^ "Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security" (PDF). GWU. 8 January 2015. Archived from the original (PDF) on 5 February 2015. Retrieved 5 February 2015.
  5. ^ "Building Code for Medical Device Software Security" (PDF). IEEE. 17 May 2015. Archived from the original (PDF) on 20 May 2015. Retrieved 17 May 2015.
  6. ^ "Landwehr named editor-in-chief of IEEE Security and Privacy". Institute for Systems Research. 6 July 2006. Retrieved 5 January 2013.
  7. ^ US 5892901, Landwehr, Carl & Latham, Daniel, "Secure Identification System", issued 6 April 1999 
  8. ^ "Disruptive Technologies for Information Assurance". Dartmouth College Institute for Security, Technology, and Society. Archived from the original on 5 February 2015. Retrieved 5 January 2013.
  9. ^ Merit Network
  10. ^ "Carl Landwehr named IEEE Fellow". Retrieved 15 January 2013.
  11. ^ "McDevitt Center Appoints Endowed Chair and Visiting Professor of Computer Science". Lemoyne College. 5 June 2014. Retrieved 5 February 2015.
  12. ^ "CDT Welcomes Three New Board Members". CDT. 15 September 2016. Retrieved 28 September 2016.
  13. ^ "Show 061 - An Interview with Carl Landwehr". Cigital. 28 April 2011. Retrieved 8 January 2013.
  14. ^ Landwehr, Carl E. (21 April 2014). "Oral History Interview with Carl E. Landwehr". Retrieved 4 February 2015.
  15. ^ "CS Digital Library Abstract A History of US Government Investments in Cybersecurity Research: A Personal Perspective". IEEE Computer Society. 16–19 May 2010. Retrieved 8 January 2013.
  16. ^ "ACM Special Interest Group on Security, Audit and Control (SIGSAC)". ACM. 31 May 2012. Archived from the original on 2 April 2013. Retrieved 14 January 2013.
  17. ^ "Cyber Security Hall of Fame to induct 11 security pioneers". Infosecurity. 17 September 2012. Retrieved 5 January 2013.
  18. ^ "National Cyber Security Hall of Fame". 6 January 2014. Archived from the original on 4 December 2013. Retrieved 6 January 2014.

External links

This page was last edited on 6 October 2023, at 01:33
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.