Publications

Export 31 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is security of data  [Clear All Filters]
Conference Papers
Condon E, He A, Cukier M.  2008.  Analysis of Computer Security Incident Data Using Time Series Models. :77-86.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
Condon E, Cukier M, He T.  2007.  Applying Software Reliability Models on Security Incidents. :159-168.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study. :174-183.
Cukier M, Panjwani S.  2007.  A Comparison between Internal and External Malicious Traffic. :109-114.
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
Molina J, Gordon J, Chorin X, Cukier M.  2007.  An empirical study of filesystem activity following a SSH compromise. :1-5.
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.
Swamy N, Hicks MW, Tse S, Zdancewic S.  2006.  Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Ramsbrock D, Berthier R, Cukier M.  2007.  Profiling Attacker Behavior Following SSH Compromises. :119-124.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH.  2002.  Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Ray A, Cleaveland R.  2006.  A Software Architectural Approach to Security by Design. Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International. 2:83-86.
Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Journal Articles
Song D, Elaine Shi, Fischer I, Shankar U.  2012.  Cloud Data Protection for the Masses. Computer. 45(1):39-45.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.

Pages