Search Results - "CUKIER, MICHEL"
-
1
Correlating human traits and cyber security behavior intentions
Published in Computers & security (01-03-2018)“…In this paper, we correlate human characteristics with cyber security behavior intentions. While previous papers have identified correlations between certain…”
Get full text
Journal Article -
2
Analysis of Computer Security Incident Data Using Time Series Models
Published in 2008 19th International Symposium on Software Reliability Engineering (ISSRE) (01-11-2008)“…Organizations face increasing challenges in addressing and preventing computer and network security incidents. There are financial consequences from security…”
Get full text
Conference Proceeding -
3
RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM
Published in Criminology (Beverly Hills) (01-02-2014)“…System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights…”
Get full text
Journal Article -
4
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities
Published in IEEE transactions on dependable and secure computing (01-03-2022)“…Vulnerabilities with publically known exploits typically form 2-7 percent of all vulnerabilities reported for a given software version. With a smaller number…”
Get full text
Journal Article -
5
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models
Published in Computers & security (01-11-2019)“…In this paper, we introduce an approach for predicting the cumulative number of software vulnerabilities that is in most cases more accurate than vulnerability…”
Get full text
Journal Article -
6
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis
Published in 2008 11th IEEE High Assurance Systems Engineering Symposium (01-12-2008)“…Darknet sensors have the interesting property of collecting only suspicious traffic, including misconfiguration, backscatter and malicious traffic. The type of…”
Get full text
Conference Proceeding -
7
Nutrition facts, drug facts, and model facts: putting AI ethics into practice in gun violence research
Published in Journal of the American Medical Informatics Association : JAMIA (01-10-2024)“…Abstract Objective Firearm injury research necessitates using data from often-exploited vulnerable populations of Black and Brown Americans. In order to reduce…”
Get full text
Journal Article -
8
Discovering features for detecting malicious websites: An empirical study
Published in Computers & security (01-10-2021)“…Website features and characteristics have shown the ability to detect various web threats – phishing, drive-by downloads, and command and control (C2). Prior…”
Get full text
Journal Article -
9
Risk and the Five Hard Problems of Cybersecurity
Published in Risk analysis (01-10-2019)“…This perspectives article addresses risk in cyber defense and identifies opportunities to incorporate risk analysis principles into the cybersecurity field…”
Get full text
Journal Article -
10
The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace
Published in Journal of Research in Crime and Delinquency (01-11-2015)“…Objectives: Test whether the presence of a surveillance message on an attacked computer system influences system trespassers’ active engagement with the…”
Get full text
Book Review Journal Article -
11
Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games
Published in Simulation & gaming (01-10-2020)“…Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of…”
Get full text
Journal Article -
12
Identifying infected users via network traffic
Published in Computers & security (01-01-2019)“…There has been increasing interest in deeper understandings of users and user behavior to tailor and strengthen cybersecurity. Just as in the field of medicine…”
Get full text
Journal Article -
13
Message from the Program Co-Chairs
Published in Proceedings - International Symposium on Software Reliability Engineering (2019)Get full text
Journal Article -
14
Cluster-based vulnerability assessment of operating systems and web browsers
Published in Computing (01-02-2019)“…Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities…”
Get full text
Journal Article -
15
Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network
Published in British journal of criminology (01-03-2013)“…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
Get full text
Journal Article -
16
Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions
Published in 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE) (01-10-2016)“…There are different ways for malware to spread from device to device. Some methods depend on the presence of a vulnerability that can be exploited along with…”
Get full text
Conference Proceeding -
17
-
18
Process mining and hierarchical clustering to help intrusion alert visualization
Published in Computers & security (01-03-2018)“…Intrusion Detection Systems (IDS) are extensively used as one of the lines of defense of a network to prevent and mitigate the risks caused by security…”
Get full text
Journal Article -
19
Message from the PDS Program Chair
Published in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (01-06-2012)“…Over the years, PDS has become a major high-quality international forum for researchers and practitioners to report on their latest advances in the analysis…”
Get full text
Conference Proceeding -
20
DAILY TRENDS AND ORIGIN OF COMPUTER-FOCUSED CRIMES AGAINST A LARGE UNIVERSITY COMPUTER NETWORK: An Application of the Routine-Activities and Lifestyle Perspective
Published in British journal of criminology (01-03-2013)“…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
Get full text
Journal Article