Publications
Co-authors
Productive Colleagues
Publications
Neumann, Peter G. (2009): Inside risks - U.S. election after-math. In Communications of the ACM, 52 (2) pp. 29. https://dl.acm.org/doi/10.1145/1461928.1461939
Neumann, Peter G. (2008): Reflections on computer-related risks. In Communications of the ACM, 51 (1) pp. 78-80. https://dl.acm.org/doi/10.1145/1327452.1327487
Horning, Jim, Neumann, Peter G. (2008): Risks of neglecting infrastructure. In Communications of the ACM, 51 (6) pp. 112. https://dl.acm.org/doi/10.1145/1349026.1349047
Neumann, Peter G. (2007): Widespread network failures. In Communications of the ACM, 50 (2) pp. 112. https://dl.acm.org/doi/10.1145/1216046
Bellovin, Steven M., Blaze, Matt, Diffie, Whitfield, Landau, Susan, Rexford, Jennifer, Neumann, Peter G. (2007): Internal surveillance, external risks. In Communications of the ACM, 50 (12) pp. 128. https://dl.acm.org/doi/10.1145/1323688.1323717
Neumann, Peter G. (2006): Trustworthy systems revisited. In Communications of the ACM, 49 (2) pp. 152. https://dl.acm.org/doi/10.1145/1113034.1113065
Neumann, Peter G. (2006): Risks relating to system compositions. In Communications of the ACM, 49 (7) pp. 120. https://dl.acm.org/doi/10.1145/1139960
Neumann, Peter G., Weinstein, Lauren (2006): Risks of RFID. In Communications of the ACM, 49 (5) pp. 136. https://dl.acm.org/doi/10.1145/1125971
Neumann, Peter G. (2006): The foresight saga. In Communications of the ACM, 49 (9) pp. 112. https://dl.acm.org/doi/10.1145/1151060
Neumann, Peter G. (2005): Responsibilities of technologists. In Communications of the ACM, 48 (2) pp. 128. https://dl.acm.org/doi/10.1145/1042091.1042129
Neumann, Peter G. (2005): Anticipating disasters. In Communications of the ACM, 48 (3) pp. 128. https://dl.acm.org/doi/10.1145/1047671.1047717
Neumann, Peter G., Byrne, Michael D. (2005): Disability-related risks. In Communications of the ACM, 48 (8) pp. 144. https://dl.acm.org/doi/10.1145/1076211.1076251
Neumann, Peter G. (2004): Optimistic optimization. In Communications of the ACM, 47 (6) pp. 112. https://dl.acm.org/doi/10.1145/990680.990711
Neumann, Peter G. (2004): The big picture. In Communications of the ACM, 47 (9) pp. 112. https://dl.acm.org/doi/10.1145/1015864.1015896
Neumann, Peter G. (2004): Introduction. In Communications of the ACM, 47 (10) pp. 28-30. https://dl.acm.org/doi/10.1145/1022594.1022617
Mercuri, Rebecca, Neumann, Peter G. (2003): Security by obscurity. In Communications of the ACM, 46 (11) pp. 160. https://dl.acm.org/doi/10.1145/948383.948413
Neumann, Peter G. (2003): Gambling on system accountability. In Communications of the ACM, 46 (2) pp. 120. https://dl.acm.org/doi/10.1145/606272.606304
Neumann, Peter G. (2003): E-epistemology and misinformation. In Communications of the ACM, 46 (5) pp. 104. https://dl.acm.org/doi/10.1145/769800.769829
Neumann, Peter G. (2003): Risks in trusting untrustworthiness. In Communications of the ACM, 46 (9) pp. 120. https://dl.acm.org/doi/10.1145/903893.903924
Neumann, Peter G. (2003): Information system security redux. In Communications of the ACM, 46 (10) pp. 136. https://dl.acm.org/doi/10.1145/944217.944248
Mercuri, Rebecca, Neumann, Peter G. (2001): System integrity revisited. In Communications of the ACM, 44 (1) pp. 160. https://dl.acm.org/doi/10.1145/357489.357517
Neumann, Peter G. (2001): What to know about risks. In Communications of the ACM, 44 (2) pp. 136. https://dl.acm.org/doi/10.1145/359205.359242
Neumann, Peter G., Parnas, David Lorge (2001): Computers: boon or bane?. In Communications of the ACM, 44 (3) pp. 168. https://dl.acm.org/doi/10.1145/365181.367913
Neumann, Peter G., Weinstein, Lauren (2001): Risks of National Identity Cards. In Communications of the ACM, 44 (12) pp. 176. https://dl.acm.org/doi/10.1145/501317.501357
Weinstein, Lauren, Neumann, Peter G. (2001): Inside Risks: Risks of Panic. In Communications of the ACM, 44 (11) pp. 152.
Neumann, Peter G. (2000): A Tale of Two Thousands. In Communications of the ACM, 43 (3) pp. 144. https://dl.acm.org/doi/10.1145/330534.330556
Neumann, Peter G. (2000): Denial-of-Service Attacks. In Communications of the ACM, 43 (4) pp. 136. https://dl.acm.org/doi/10.1145/332051.332797
Neumann, Peter G. (2000): Risks in retrospect. In Communications of the ACM, 43 (7) pp. 144. https://dl.acm.org/doi/10.1145/341852.341878
Neumann, Peter G. (2000): Missile defense. In Communications of the ACM, 43 (9) pp. 128. https://dl.acm.org/doi/10.1145/348941.349030
Weinstein, Lauren, Neumann, Peter G. (2000): Internet Risks. In Communications of the ACM, 43 (5) pp. 144. https://dl.acm.org/doi/10.1145/332833.332854
Neumann, Peter G. (1999): IC Online Exclusive Interview: Internet Security - Beyond Cryptography. In IEEE Internet Computing, 3 (2) pp. 100.
Neumann, Peter G. (1999): Robust Open-Source Software. In Communications of the ACM, 42 (2) pp. 128. https://dl.acm.org/doi/10.1145/293411.293491
Neumann, Peter G. (1999): Information is a Double-Edged Sword. In Communications of the ACM, 42 (7) pp. 120. https://dl.acm.org/doi/10.1145/306549.306599
Neumann, Peter G. (1999): Risks of Insiders. In Communications of the ACM, 42 (12) pp. 160. https://dl.acm.org/doi/10.1145/322796.322817
Neumann, Peter G., McCullagh, Declan (1999): Risks of Y2K. In Communications of the ACM, 42 (6) pp. 144. https://dl.acm.org/doi/10.1145/303849.303872
Neumann, Peter G., Weinstein, Lauren (1999): Risks of Content Filtering. In Communications of the ACM, 42 (11) pp. 152. https://dl.acm.org/doi/10.1145/319382.319403
Neumann, Peter G. (1998): Protecting the Infrastructures. In Communications of the ACM, 41 (1) pp. 128. https://dl.acm.org/doi/10.1145/268092.268126
Neumann, Peter G. (1998): Are Computers Addictive?. In Communications of the ACM, 41 (3) pp. 128.
Neumann, Peter G. (1998): Internet Gambling. In Communications of the ACM, 41 (2) pp. 112.
Neumann, Peter G. (1998): Laptops in Congress?. In Communications of the ACM, 41 (7) pp. 128. https://dl.acm.org/doi/10.1145/278476.278501
Neumann, Peter G. (1998): Y2K Update. In Communications of the ACM, 41 (9) pp. 128.
Neumann, Peter G. (1998): Risks of E-Education. In Communications of the ACM, 41 (10) pp. 136.
Neumann, Peter G. (1997): Hopes for Fewer Risks?. In Communications of the ACM, 40 (2) pp. 170.
Neumann, Peter G. (1997): The Big Picture. In Communications of the ACM, 40 (5) pp. 136.
Neumann, Peter G. (1997): Identity-Ralated Misuse. In Communications of the ACM, 40 (7) pp. 112.
Neumann, Peter G. (1997): Crypto Key Management. In Communications of the ACM, 40 (8) pp. 136.
Neumann, Peter G. (1997): Integrity in Software Development. In Communications of the ACM, 40 (10) pp. 144.
Neumann, Peter G. (1997): System Development Woes. In Communications of the ACM, 40 (12) pp. 160.
Neumann, Peter G., Weinstein, Lauren (1997): Spam, Spam, Spam!. In Communications of the ACM, 40 (6) pp. 112.
Neumann, Peter G. (1996): Risks in Digital Commerce. In Communications of the ACM, 39 (1) pp. 154.
Neumann, Peter G. (1996): Disinformation Theory. In Communications of the ACM, 39 (10) pp. 138.
Neumann, Peter G. (1996): Distributed Systems have Distributed Risks. In Communications of the ACM, 39 (11) pp. 130.
Neumann, Peter G. (1996): Risks of Anonymity. In Communications of the ACM, 39 (12) pp. 162.
Neumann, Peter G. (1996): A Risks-related Bookshelf. In Communications of the ACM, 39 (4) pp. 122.
Neumann, Peter G. (1996): Linguistic Risks. In Communications of the ACM, 39 (5) pp. 154.
Neumann, Peter G. (1996): Using Formal Methods to Reduce Risks. In Communications of the ACM, 39 (7) pp. 114.
Neumann, Peter G., Denning, Peter J. (1996): W(h)ither Research and Education?. In Communications of the ACM, 39 (2) pp. 154.
Neumann, Peter G. (1995): Reassessing the Crypto Debate. In Communications of the ACM, 38 (3) pp. 138.
Neumann, Peter G. (1995): Risks of Easy Answers. In Communications of the ACM, 38 (9) pp. 130.
Neumann, Peter G. (1995): Reviewing the Risks Archives. In Communications of the ACM, 38 (12) pp. 138.
Neumann, Peter G. (1995): Computer Vulnerabilities: Exploitation or Avoidance. In Communications of the ACM, 38 (6) pp. 138.
Landau, Susan, Kent, Stephen T., Brooks, Clint, Charney, Scott, Denning, Dorothy E., Diffie, Whitfield, Lauck, Anthony, Miller, Douglas, Neumann, Peter G., Sobel, David (1994): Crypto Policy Perspectives. In Communications of the ACM, 37 (8) pp. 115-121.
Neumann, Peter G. (1994): Technology, Laws, and Society. In Communications of the ACM, 37 (3) pp. 138.
Neumann, Peter G. (1994): Risks of Passwords. In Communications of the ACM, 37 (4) pp. 126.
Neumann, Peter G. (1994): Alternative Passwords. In Communications of the ACM, 37 (5) pp. 146.
Neumann, Peter G. (1994): Risks on the Information Superhighway. In Communications of the ACM, 37 (6) pp. 114.
Neumann, Peter G. (1994): Friendly Fire. In Communications of the ACM, 37 (8) pp. 138.
Neumann, Peter G. (1994): Expectations of Security and Privacy. In Communications of the ACM, 37 (9) pp. 138.
Neumann, Peter G. (1994): Inside \"Inside Risks. In Communications of the ACM, 37 (12) pp. 154.
Neumann, Peter G. (1993): Risks Considered Global(ly). In Communications of the ACM, 36 (1) pp. 154.
Neumann, Peter G. (1993): Are Dependable Systems Feasible?. In Communications of the ACM, 36 (2) pp. 146.
Neumann, Peter G. (1993): Risks of Technology. In Communications of the ACM, 36 (3) pp. 130.
Neumann, Peter G. (1993): Using Names as Identifiers. In Communications of the ACM, 36 (4) pp. 154.
Neumann, Peter G. (1993): The Role of Software Engineering. In Communications of the ACM, 36 (5) pp. 114.
Neumann, Peter G. (1993): Modeling and Simulation. In Communications of the ACM, 36 (6) pp. 124.
Neumann, Peter G. (1993): Risks on the Rails. In Communications of the ACM, 36 (7) pp. 130.
Neumann, Peter G. (1993): Risks of Surveillance. In Communications of the ACM, 36 (8) pp. 122.
Neumann, Peter G. (1993): Animal Crackers. In Communications of the ACM, 36 (9) pp. 162.
Neumann, Peter G. (1993): System Development Woes. In Communications of the ACM, 36 (10) pp. 146.
Neumann, Peter G. (1992): Survivable Systems. In Communications of the ACM, 35 (5) pp. 130.
Neumann, Peter G. (1992): Aggravation by Computer: Life, Death, and Taxes. In Communications of the ACM, 35 (7) pp. 122.
Neumann, Peter G. (1992): What\'s in a Name?. In Communications of the ACM, 35 (1) pp. 186.
Neumann, Peter G. (1992): Inside \"Risks of Risks. In Communications of the ACM, 35 (3) pp. 160.
Neumann, Peter G. (1992): Leap-Year Problems. In Communications of the ACM, 35 (6) pp. 162.
Neumann, Peter G. (1992): Fraud by Computer. In Communications of the ACM, 35 (8) pp. 154.
Neumann, Peter G. (1992): Accidental Financial Losses. In Communications of the ACM, 35 (9) pp. 194.
Neumann, Peter G. (1992): Where to Place Trust. In Communications of the ACM, 35 (10) pp. 138.
Neumann, Peter G. (1992): Avoiding Weak Links. In Communications of the ACM, 35 (12) pp. 146.
Neumann, Peter G. (1991): The Not-So-Accidental Holist. In Communications of the ACM, 34 (9) pp. 122.
Neumann, Peter G. (1991): Computers, Ethics, and Values. In Communications of the ACM, 34 (7) pp. 106.
Neumann, Peter G. (1991): Expecting the Unexpected Mayday. In Communications of the ACM, 34 (5) pp. 128.
Neumann, Peter G. (1991): Interpreting (Mis)information. In Communications of the ACM, 34 (4) pp. 144.
Neumann, Peter G. (1991): Putting on Your Best Interface. In Communications of the ACM, 34 (3) pp. 138.
Neumann, Peter G. (1991): Certifying Professionals. In Communications of the ACM, 34 (2) pp. 130.
Neumann, Peter G. (1991): The Clock Grows at Midnight. In Communications of the ACM, 34 (1) pp. 170.
Neumann, Peter G. (1991): The Human Element. In Communications of the ACM, 34 (11) pp. 150.
Neumann, Peter G. (1991): Collaborative Effords. In Communications of the ACM, 34 (12) pp. 162.
Neumann, Peter G. (1990): Risks in Computerized Elections. In Communications of the ACM, 33 (11) pp. 170.
Neumann, Peter G. (1990): Ghosts, Mysteries and Uncertainty. In Communications of the ACM, 33 (10) pp. 170.
Neumann, Peter G. (1990): A Few Old Coincidences. In Communications of the ACM, 33 (9) pp. 202.
Neumann, Peter G. (1990): Insecurity about Security?. In Communications of the ACM, 33 (8) pp. 170.
Neumann, Peter G. (1990): Some Reflections on a Telephone Switching Problem. In Communications of the ACM, 33 (7) pp. 154.
Neumann, Peter G. (1984): A Further View of the First Quarter Century, Introduction to the April 1984 Special Sectio. In Communications of the ACM, 27 (4) pp. 343.
Neumann, Peter G. (2000): Requirements-Related Risks in Critical Systems. In: ICRE 2000 , 2000, . pp. 3-. https://csdl.computer.org/comp/proceedings/icre/2000/0565/00/05650003abs.htm
Neumann, Peter G. (2000): Certitude and Rectitude. In: ICRE 2000 , 2000, . pp. 153. https://csdl.computer.org/comp/proceedings/icre/2000/0565/00/05650153abs.htm