Подписаться
Michel Cukier
Michel Cukier
Associate Professor, University of Maryland
Подтвержден адрес электронной почты в домене umd.edu
Название
Процитировано
Процитировано
Год
Correlating human traits and cyber security behavior intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
computers & security 73, 345-358, 2018
3072018
AQuA: An adaptive architecture that provides dependable distributed objects
M Cukier, J Ren, C Sabnis, D Henke, J Pistole, WH Sanders, DE Bakken, ...
Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat …, 1998
2891998
Nfsight: netflow-based network awareness tool
R Berthier, M Cukier, M Hiltunen, D Kormann, G Vesonder, D Sheleheda
1592010
Restrictive deterrent effects of a warning banner in an attacked computer system
D Maimon, M Alper, B Sobesto, M Cukier
Criminology 52 (1), 33-59, 2014
1562014
An experimental evaluation to determine if port scans are precursors to an attack
S Panjwani, S Tan, KM Jarrin, M Cukier
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
1512005
Profiling attacker behavior following SSH compromises
D Ramsbrock, R Berthier, M Cukier
37th Annual IEEE/IFIP international conference on dependable systems and …, 2007
1502007
Probabilistic validation of an intrusion-tolerant replication system
S Singh, M Cukier, WH Sanders
DSN, 615-624, 2003
982003
AQuA: An adaptive architecture that provides dependable distributed objects
Y Ren, DE Bakken, T Courtney, M Cukier, DA Karr, P Rubel, C Sabnis, ...
IEEE Transactions on Computers 52 (1), 31-50, 2003
972003
Assessing the attack threat due to IRC channels
R Meyer, M Cukier
International Conference on Dependable Systems and Networks (DSN'06), 467-472, 2006
812006
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective
D Maimon, A Kamerdze, M Cukier, B Sobesto
British Journal of Criminology 53 (2), 319-343, 2013
782013
Coverage estimation methods for stratified fault-injection
M Cukier, D Powell, J Ariat
IEEE Transactions on Computers 48 (7), 707-723, 1999
741999
Quantifying the cost of providing intrusion tolerance in group communication systems
HGV Ramasamy, P Pandey, J Lyons, M Cukier, WH Sanders
Proceedings International Conference on Dependable Systems and Networks, 229-238, 2002
692002
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace
T Wilson, D Maimon, B Sobesto, M Cukier
Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015
682015
A global-state-triggered fault injector for distributed system evaluation
R Chandra, RM Lefever, KR Joshi, M Cukier, WH Sanders
IEEE Transactions on Parallel and Distributed Systems 15 (7), 593-605, 2004
652004
Loki: A state-driven fault injector for distributed systems
R Chandra, RM Lefever, M Cukier, WH Sanders
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
652000
Risk and the five hard problems of cybersecurity
NM Scala, AC Reilly, PL Goethals, M Cukier
Risk Analysis 39 (10), 2119-2126, 2019
582019
An adaptive quality of service aware middleware for replicated services
S Krishnamurthy, WH Sanders, M Cukier
IEEE Transactions on Parallel and Distributed Systems 14 (11), 1112-1125, 2003
572003
Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games
M Coenraad, A Pellicone, DJ Ketelhut, M Cukier, J Plane, D Weintrop
Simulation & Gaming 51 (5), 586-611, 2020
552020
Analysis of computer security incident data using time series models
E Condon, A He, M Cukier
2008 19th international symposium on software reliability engineering (ISSRE …, 2008
542008
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors
A Testa, D Maimon, B Sobesto, M Cukier
Criminology & Public Policy 16 (3), 689-726, 2017
532017
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20