Search Results - "CUKIER, MICHEL"

Refine Results
  1. 1

    Correlating human traits and cyber security behavior intentions by Gratian, Margaret, Bandi, Sruthi, Cukier, Michel, Dykstra, Josiah, Ginther, Amy

    Published in Computers & security (01-03-2018)
    “…In this paper, we correlate human characteristics with cyber security behavior intentions. While previous papers have identified correlations between certain…”
    Get full text
    Journal Article
  2. 2

    Analysis of Computer Security Incident Data Using Time Series Models by Condon, E., He, A., Cukier, M.

    “…Organizations face increasing challenges in addressing and preventing computer and network security incidents. There are financial consequences from security…”
    Get full text
    Conference Proceeding
  3. 3

    RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM by MAIMON, DAVID, ALPER, MARIEL, SOBESTO, BERTRAND, CUKIER, MICHEL

    Published in Criminology (Beverly Hills) (01-02-2014)
    “…System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights…”
    Get full text
    Journal Article
  4. 4

    Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities by Movahedi, Yazdan, Cukier, Michel, Gashi, Ilir

    “…Vulnerabilities with publically known exploits typically form 2-7 percent of all vulnerabilities reported for a given software version. With a smaller number…”
    Get full text
    Journal Article
  5. 5

    Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models by Movahedi, Yazdan, Cukier, Michel, Gashi, Ilir

    Published in Computers & security (01-11-2019)
    “…In this paper, we introduce an approach for predicting the cumulative number of software vulnerabilities that is in most cases more accurate than vulnerability…”
    Get full text
    Journal Article
  6. 6

    The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis by Berthier, R., Cukier, M.

    “…Darknet sensors have the interesting property of collecting only suspicious traffic, including misconfiguration, backscatter and malicious traffic. The type of…”
    Get full text
    Conference Proceeding
  7. 7

    Nutrition facts, drug facts, and model facts: putting AI ethics into practice in gun violence research by Zhu, Jessica, Cukier, Michel, Richardson, Joseph

    “…Abstract Objective Firearm injury research necessitates using data from often-exploited vulnerable populations of Black and Brown Americans. In order to reduce…”
    Get full text
    Journal Article
  8. 8

    Discovering features for detecting malicious websites: An empirical study by McGahagan, John, Bhansali, Darshan, Pinto-Coelho, Ciro, Cukier, Michel

    Published in Computers & security (01-10-2021)
    “…Website features and characteristics have shown the ability to detect various web threats – phishing, drive-by downloads, and command and control (C2). Prior…”
    Get full text
    Journal Article
  9. 9

    Risk and the Five Hard Problems of Cybersecurity by Scala, Natalie M., Reilly, Allison C., Goethals, Paul L., Cukier, Michel

    Published in Risk analysis (01-10-2019)
    “…This perspectives article addresses risk in cyber defense and identifies opportunities to incorporate risk analysis principles into the cybersecurity field…”
    Get full text
    Journal Article
  10. 10

    The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace by Wilson, Theodore, Maimon, David, Sobesto, Bertrand, Cukier, Michel

    “…Objectives: Test whether the presence of a surveillance message on an attacked computer system influences system trespassers’ active engagement with the…”
    Get full text
    Book Review Journal Article
  11. 11

    Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games by Coenraad, Merijke, Pellicone, Anthony, Ketelhut, Diane Jass, Cukier, Michel, Plane, Jan, Weintrop, David

    Published in Simulation & gaming (01-10-2020)
    “…Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of…”
    Get full text
    Journal Article
  12. 12

    Identifying infected users via network traffic by Gratian, Margaret, Bhansali, Darshan, Cukier, Michel, Dykstra, Josiah

    Published in Computers & security (01-01-2019)
    “…There has been increasing interest in deeper understandings of users and user behavior to tailor and strengthen cybersecurity. Just as in the field of medicine…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Cluster-based vulnerability assessment of operating systems and web browsers by Movahedi, Yazdan, Cukier, Michel, Andongabo, Ambrose, Gashi, Ilir

    Published in Computing (01-02-2019)
    “…Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities…”
    Get full text
    Journal Article
  15. 15

    Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network by Maimon, David, Kamerdze, Amy, Cukier, Michel, Sobesto, Bertrand

    Published in British journal of criminology (01-03-2013)
    “…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
    Get full text
    Journal Article
  16. 16

    Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions by Condon, Edward, Cukier, Michel

    “…There are different ways for malware to spread from device to device. Some methods depend on the presence of a vulnerability that can be exploited along with…”
    Get full text
    Conference Proceeding
  17. 17
  18. 18

    Process mining and hierarchical clustering to help intrusion alert visualization by de Alvarenga, Sean Carlisto, Barbon, Sylvio, Miani, Rodrigo Sanches, Cukier, Michel, Zarpelão, Bruno Bogaz

    Published in Computers & security (01-03-2018)
    “…Intrusion Detection Systems (IDS) are extensively used as one of the lines of defense of a network to prevent and mitigate the risks caused by security…”
    Get full text
    Journal Article
  19. 19

    Message from the PDS Program Chair by Cukier, Michel

    “…Over the years, PDS has become a major high-quality international forum for researchers and practitioners to report on their latest advances in the analysis…”
    Get full text
    Conference Proceeding
  20. 20

    DAILY TRENDS AND ORIGIN OF COMPUTER-FOCUSED CRIMES AGAINST A LARGE UNIVERSITY COMPUTER NETWORK: An Application of the Routine-Activities and Lifestyle Perspective by Maimon, David, Kamerdze, Amy, Cukier, Michel, Sobesto, Bertrand

    Published in British journal of criminology (01-03-2013)
    “…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
    Get full text
    Journal Article