Search Results - "Vasserman, Eugene Y"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance by Brase, Gary L, Vasserman, Eugene Y, Hsu, William

    Published in Frontiers in psychology (02-11-2017)
    “…Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security…”
    Get full text
    Journal Article
  2. 2

    Review of the Security of Backward-Compatible Automotive Inter-ECU Communication by Sharma, Chandra, Moylan, Samuel, Vasserman, Eugene Y., Amariucai, George T.

    Published in IEEE access (2021)
    “…Advanced electronic units inside modern vehicles have enhanced the driving experience, but also introduced a myriad of security problems due to the inherent…”
    Get full text
    Journal Article
  3. 3

    Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs by Mohaien, Abedelaziz, Kune, Denis Foo, Vasserman, Eugene Y., Myungsun Kim, Yongdae Kim

    “…Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network…”
    Get full text
    Journal Article
  4. 4

    SilentKnock: practical, provably undetectable authentication by Vasserman, Eugene Y., Hopper, Nicholas, Tyra, James

    “…Port knocking is a technique to prevent attackers from discovering and exploiting vulnerable network services, while allowing access for authenticated users…”
    Get full text
    Journal Article
  5. 5

    Functional Alarms for Systems of Interoperable Medical Devices by Venkatasubramanian, Krishna K., Vasserman, Eugene Y., Sokolsky, Oleg, Insup Lee

    “…Alarms are essential for medical systems in order to ensure patient safety during deteriorating clinical situations and inevitable device malfunction. As…”
    Get full text
    Conference Proceeding Journal Article
  6. 6

    On Zero-Dynamics Stealthy Attacks with Learned State Space Models by Harshbarger, Stephanie, Natarajan, Balasubramaniam, Vasserman, Eugene Y., Umar, Muhammad Farooq, Shadmand, Mohammad, Amariucai, George

    “…Zero-dynamics stealthy attacks are a subset of false data injection attacks (FDIAs) that can be catastrophic as they are designed to be undetectable by…”
    Get full text
    Conference Proceeding
  7. 7

    Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks by Yang Xue, Vasserman, Eugene Y.

    “…This paper presents PIVOT, a new flow fingerprinting scheme for identifying websites visited by a user of a low-latency anonymous communication system. The…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    On the Value of Labeled Data and Symbolic Methods for Hidden Neuron Activation Analysis by Dalal, Abhilekha, Rayan, Rushrukh, Barua, Adrita, Vasserman, Eugene Y, Sarker, Md Kamruzzaman, Hitzler, Pascal

    Published 21-04-2024
    “…A major challenge in Explainable AI is in correctly interpreting activations of hidden neurons: accurate interpretations would help answer the question of what…”
    Get full text
    Journal Article
  9. 9

    Review of the Security of Backward-Compatible Automotive Inter-ECU Communication by Sharma, Chandra, Moylan, Samuel, Amariucai, George, Vasserman, Eugene Y

    Published 27-09-2021
    “…Advanced electronic units inside modern vehicles have enhanced the driving experience, but also introduced a myriad of security problems due to the inherent…”
    Get full text
    Journal Article
  10. 10

    Challenges of distributed risk management for medical application platforms by Hatcliff, John, Vasserman, Eugene Y., Carpenter, Todd, Whillock, Rand

    “…ISO 14971, the primary medical device risk management standard focuses on single-manufacturer monolithic devices. However, the trend towards medical systems…”
    Get full text
    Conference Proceeding
  11. 11

    Combating Double-Spending Using Cooperative P2P Systems by Osipkov, I., Vasserman, E.Y., Hopper, N., Yongdae Kim

    “…An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating…”
    Get full text
    Conference Proceeding
  12. 12

    Towards freedom of speech on the Internet: Censorship-resistant communication and storage by Vasserman, Eugene Y

    Published 01-01-2010
    “…This work explores the problem space of censorship resistance with the explicit goal of protecting a censorship-resistant system and its users from powerful…”
    Get full text
    Dissertation
  13. 13

    Security and Interoperable-Medical-Device Systems, Part 1 by Venkatasubramanian, Krishna K., Vasserman, Eugene Y., Sokolsky, Oleg, Lee, Insup

    Published in IEEE security & privacy (01-09-2012)
    “…Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure…”
    Get full text
    Magazine Article
  14. 14
  15. 15

    Towards freedom of speech on the Internet: Censorship-resistant communication and storage by Vasserman, Eugene Y

    “…This work explores the problem space of censorship resistance with the explicit goal of protecting a censorship-resistant system and its users from powerful…”
    Get full text
    Dissertation
  16. 16

    Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification by Vasserman, Eugene Y., Venkatasubramanian, Krishna K., Sokolsky, Oleg, Lee, Insup

    Published in IEEE security & privacy (01-11-2012)
    “…Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure…”
    Get full text
    Magazine Article
  17. 17

    Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks by Vasserman, E. Y., Hopper, N.

    Published in IEEE transactions on mobile computing (01-02-2013)
    “…Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused…”
    Get full text
    Magazine Article