Rock Stevens
Rock Stevens
Потвърден имейл адрес: - Начална страница
Hackers vs. testers: A comparison of software vulnerability discovery processes
D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
A comprehensive quality evaluation of security and privacy advice on the web
EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 89-108, 2020
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş, 2017
Compliance Cautions: Investigating Security Issues Associated with US Digital-Security Standards.
R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ...
NDSS, 2020
Comparing and developing tools to measure the readability of domain-specific texts
E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
First steps toward measuring the readability of security advice
EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ...
The 2018 IEEE Security & Privacy Workshop on Technology and Consumer …, 2018
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
R Stevens, J Dykstra, WK Everette, M Mazurek
IEEE Security & Privacy, 2020
Calcifying Crisis Readiness
R Stevens
Applied Digital Threat Modeling: It Works
R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek
IEEE Security & Privacy 17 (4), 35-42, 2019
Offensive Digital Countermeasures: Exploring the Implications for Governments
R Stevens, J Biller
The Cyber Defense Review 3 (3), 93-114, 2018
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems
R Stevens
2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017
How to Hack Compliance: Using Lessons Learned to Repeatably Audit Compliance Programs for Digital Security Concerns
R Stevens, J Dykstra, W Knox-Everette, ML Mazurek
Learning from Authoritative Security Experiment Results (LASER), 2020
14 Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
CM Ahmed, J Zhou, R Padilha, CM Rodrigues, F Andaló, G Bertocco, ...
Optimizing Proactive Measures for Security Operations
RA Stevens
University of Maryland, College Park, 2020
Digital Words: Moving Forward with Measuring the Readability of Online Texts
EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Army Vulnerability Response Program: A Critical Need in the Defense of our Nation
R Stevens, M Weigand
Cyber Defense Review, 2015
Physical Security Threat from Hotel Wi-Fi
R Stevens, A Blum
2600 Magazine: The Hacker Quarterly, 2012
FLIP Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline™ Hardware Implementation
S Mosley, M Potasznik, K Davis, R Stevens, M Ballmann, B Ancheta, ...
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20