Search Results - "Sobesto, Bertrand"
-
1
RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM
Published in Criminology (Beverly Hills) (01-02-2014)“…System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights…”
Get full text
Journal Article -
2
The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace
Published in Journal of Research in Crime and Delinquency (01-11-2015)“…Objectives: Test whether the presence of a surveillance message on an attacked computer system influences system trespassers’ active engagement with the…”
Get full text
Book Review Journal Article -
3
Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network
Published in British journal of criminology (01-03-2013)“…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
Get full text
Journal Article -
4
-
5
DAILY TRENDS AND ORIGIN OF COMPUTER-FOCUSED CRIMES AGAINST A LARGE UNIVERSITY COMPUTER NETWORK: An Application of the Routine-Activities and Lifestyle Perspective
Published in British journal of criminology (01-03-2013)“…Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been…”
Get full text
Journal Article -
6
Illegal Roaming and File Manipulation on Target Computers
Published in Criminology & public policy (01-08-2017)“…Research Summary The results of previous research indicate that the presentation of deterring situational stimuli in an attacked computing environment shapes…”
Get full text
Journal Article -
7
Empirical studies based on honeypots for characterizing attackers behavior
Published 01-01-2015“…The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is…”
Get full text
Dissertation -
8
A study of the relationship between antivirus regressions and label changes
Published in 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE) (01-11-2013)“…AntiVirus (AV) products use multiple components to detect malware. A component which is found in virtually all AVs is the signature-based detection engine:…”
Get full text
Conference Proceeding -
9
A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues
Published in 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS) (01-09-2015)“…There are currently no generally accepted metrics for information security issues. One reason is the lack of validation using empirical data. In this practical…”
Get full text
Conference Proceeding Journal Article -
10
Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study
Published in 2012 IEEE 23rd International Symposium on Software Reliability Engineering (01-11-2012)“…This paper describes an empirical study to assess whether computer focused crimes are impacted by system configurations. The study relies on data collected…”
Get full text
Conference Proceeding -
11
Empirical studies based on honeypots for characterizing attackers behavior
Get full text
Dissertation -
12
Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors
Published in 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) (01-06-2016)“…In this paper we report results of an empirical analysis of the detection capabilities of 9 AntiVirus (AV) products when they were subjected to 3605 malware…”
Get full text
Conference Proceeding -
13
Characterizing Attackers and Attacks: An Empirical Study
Published in 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (01-12-2011)“…This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and…”
Get full text
Conference Proceeding