Search Results - "Sobesto, Bertrand"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM by MAIMON, DAVID, ALPER, MARIEL, SOBESTO, BERTRAND, CUKIER, MICHEL

    Published in Criminology (Beverly Hills) (01-02-2014)
    “…System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights…”
    Get full text
    Journal Article
  2. 2

    The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace by Wilson, Theodore, Maimon, David, Sobesto, Bertrand, Cukier, Michel

    “…Objectives: Test whether the presence of a surveillance message on an attacked computer system influences system trespassers’ active engagement with the…”
    Get full text
    Book Review Journal Article
  3. 3

    Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network by Maimon, David, Kamerdze, Amy, Cukier, Michel, Sobesto, Bertrand

    Published in British journal of criminology (01-03-2013)
    “…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
    Get full text
    Journal Article
  4. 4
  5. 5

    DAILY TRENDS AND ORIGIN OF COMPUTER-FOCUSED CRIMES AGAINST A LARGE UNIVERSITY COMPUTER NETWORK: An Application of the Routine-Activities and Lifestyle Perspective by Maimon, David, Kamerdze, Amy, Cukier, Michel, Sobesto, Bertrand

    Published in British journal of criminology (01-03-2013)
    “…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
    Get full text
    Journal Article
  6. 6

    Illegal Roaming and File Manipulation on Target Computers by Testa, Alexander, Maimon, David, Sobesto, Bertrand, Cukier, Michel

    Published in Criminology & public policy (01-08-2017)
    “…Research Summary The results of previous research indicate that the presentation of deterring situational stimuli in an attacked computing environment shapes…”
    Get full text
    Journal Article
  7. 7

    Empirical studies based on honeypots for characterizing attackers behavior by Sobesto, Bertrand

    Published 01-01-2015
    “…The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is…”
    Get full text
    Dissertation
  8. 8

    A study of the relationship between antivirus regressions and label changes by Gashi, Ilir, Sobesto, Bertrand, Mason, Stephen, Stankovic, Vladimir, Cukier, Michel

    “…AntiVirus (AV) products use multiple components to detect malware. A component which is found in virtually all AVs is the signature-based detection engine:…”
    Get full text
    Conference Proceeding
  9. 9

    A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues by Sanches Miani, Rodrigo, Bogaz Zarpelao, Bruno, Sobesto, Bertrand, Cukier, Michel

    “…There are currently no generally accepted metrics for information security issues. One reason is the lack of validation using empirical data. In this practical…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study by Sobesto, B., Cukier, M., Maimon, D.

    “…This paper describes an empirical study to assess whether computer focused crimes are impacted by system configurations. The study relies on data collected…”
    Get full text
    Conference Proceeding
  11. 11

    Empirical studies based on honeypots for characterizing attackers behavior by Sobesto, Bertrand

    “…The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is…”
    Get full text
    Dissertation
  12. 12

    Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors by Algaith, Areej, Gashi, Ilir, Sobesto, Bertrand, Cukier, Michel, Haxhijaha, Selman, Bajrami, Gazmend

    “…In this paper we report results of an empirical analysis of the detection capabilities of 9 AntiVirus (AV) products when they were subjected to 3605 malware…”
    Get full text
    Conference Proceeding
  13. 13

    Characterizing Attackers and Attacks: An Empirical Study by Salles-Loustau, G., Berthier, R., Collange, E., Sobesto, B., Cukier, M.

    “…This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and…”
    Get full text
    Conference Proceeding