1. Towards highly reliable enterprise network services via inference of multi-level dependencies
2. Using Magpie for Request Extraction and Workload Modelling;Barham Paul;OSDI,2004
3. Sean Barnum. 2012. Standardizing cyber threat intelligence information with the Structured Threat Information expression (STIX). http://www.standardscoordination.org/sites/default/files/docs/STIX_Whitepaper_v1.l.pdf. MITRE Corporation Version 1.1 Revision 1 (2012). Sean Barnum. 2012. Standardizing cyber threat intelligence information with the Structured Threat Information expression (STIX). http://www.standardscoordination.org/sites/default/files/docs/STIX_Whitepaper_v1.l.pdf. MITRE Corporation Version 1.1 Revision 1 (2012).
4. System, method and apparatus for federated single sign-on services. (May 22 2007);Barriga-Caceres Luis;US Patent,2007
5. Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users