Search Results - "Vasserman, Eugene Y"
-
1
Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance
Published in Frontiers in psychology (02-11-2017)“…Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security…”
Get full text
Journal Article -
2
Review of the Security of Backward-Compatible Automotive Inter-ECU Communication
Published in IEEE access (2021)“…Advanced electronic units inside modern vehicles have enhanced the driving experience, but also introduced a myriad of security problems due to the inherent…”
Get full text
Journal Article -
3
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
Published in IEEE transactions on dependable and secure computing (01-11-2013)“…Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network…”
Get full text
Journal Article -
4
SilentKnock: practical, provably undetectable authentication
Published in International journal of information security (01-04-2009)“…Port knocking is a technique to prevent attackers from discovering and exploiting vulnerable network services, while allowing access for authenticated users…”
Get full text
Journal Article -
5
Functional Alarms for Systems of Interoperable Medical Devices
Published in 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (01-01-2014)“…Alarms are essential for medical systems in order to ensure patient safety during deteriorating clinical situations and inevitable device malfunction. As…”
Get full text
Conference Proceeding Journal Article -
6
On Zero-Dynamics Stealthy Attacks with Learned State Space Models
Published in 2024 4th International Conference on Smart Grid and Renewable Energy (SGRE) (08-01-2024)“…Zero-dynamics stealthy attacks are a subset of false data injection attacks (FDIAs) that can be catastrophic as they are designed to be undetectable by…”
Get full text
Conference Proceeding -
7
Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks
Published in 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2016)“…This paper presents PIVOT, a new flow fingerprinting scheme for identifying websites visited by a user of a low-latency anonymous communication system. The…”
Get full text
Conference Proceeding Journal Article -
8
On the Value of Labeled Data and Symbolic Methods for Hidden Neuron Activation Analysis
Published 21-04-2024“…A major challenge in Explainable AI is in correctly interpreting activations of hidden neurons: accurate interpretations would help answer the question of what…”
Get full text
Journal Article -
9
Review of the Security of Backward-Compatible Automotive Inter-ECU Communication
Published 27-09-2021“…Advanced electronic units inside modern vehicles have enhanced the driving experience, but also introduced a myriad of security problems due to the inherent…”
Get full text
Journal Article -
10
Challenges of distributed risk management for medical application platforms
Published in 2018 IEEE Symposium on Product Compliance Engineering (ISPCE) (01-05-2018)“…ISO 14971, the primary medical device risk management standard focuses on single-manufacturer monolithic devices. However, the trend towards medical systems…”
Get full text
Conference Proceeding -
11
Combating Double-Spending Using Cooperative P2P Systems
Published in 27th International Conference on Distributed Computing Systems (ICDCS '07) (01-06-2007)“…An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating…”
Get full text
Conference Proceeding -
12
Towards freedom of speech on the Internet: Censorship-resistant communication and storage
Published 01-01-2010“…This work explores the problem space of censorship resistance with the explicit goal of protecting a censorship-resistant system and its users from powerful…”
Get full text
Dissertation -
13
Security and Interoperable-Medical-Device Systems, Part 1
Published in IEEE security & privacy (01-09-2012)“…Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure…”
Get full text
Magazine Article -
14
Security and Interoperable Medical Device Systems, Part 2: Failures, Consequences and Classifications
Published in IEEE security & privacy (01-11-2012)Get full text
Magazine Article -
15
Towards freedom of speech on the Internet: Censorship-resistant communication and storage
Get full text
Dissertation -
16
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification
Published in IEEE security & privacy (01-11-2012)“…Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure…”
Get full text
Magazine Article -
17
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Published in IEEE transactions on mobile computing (01-02-2013)“…Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused…”
Get full text
Magazine Article