עקוב אחר
Michel Cukier
Michel Cukier
Associate Professor, University of Maryland
כתובת אימייל מאומתת בדומיין umd.edu
כותרת
צוטט על ידי
צוטט על ידי
שנה
Correlating human traits and cyber security behavior intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
computers & security 73, 345-358, 2018
3162018
AQuA: An adaptive architecture that provides dependable distributed objects
M Cukier, J Ren, C Sabnis, D Henke, J Pistole, WH Sanders, DE Bakken, ...
Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat …, 1998
2891998
Nfsight: netflow-based network awareness tool
R Berthier, M Cukier, M Hiltunen, D Kormann, G Vesonder, D Sheleheda
1612010
Restrictive deterrent effects of a warning banner in an attacked computer system
D Maimon, M Alper, B Sobesto, M Cukier
Criminology 52 (1), 33-59, 2014
1562014
Profiling attacker behavior following SSH compromises
D Ramsbrock, R Berthier, M Cukier
37th Annual IEEE/IFIP international conference on dependable systems and …, 2007
1512007
An experimental evaluation to determine if port scans are precursors to an attack
S Panjwani, S Tan, KM Jarrin, M Cukier
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
1512005
Probabilistic validation of an intrusion-tolerant replication system
S Singh, M Cukier, WH Sanders
DSN, 615-624, 2003
982003
AQuA: An adaptive architecture that provides dependable distributed objects
Y Ren, DE Bakken, T Courtney, M Cukier, DA Karr, P Rubel, C Sabnis, ...
IEEE Transactions on Computers 52 (1), 31-50, 2003
972003
Assessing the attack threat due to IRC channels
R Meyer, M Cukier
International Conference on Dependable Systems and Networks (DSN'06), 467-472, 2006
812006
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective
D Maimon, A Kamerdze, M Cukier, B Sobesto
British Journal of Criminology 53 (2), 319-343, 2013
782013
Coverage estimation methods for stratified fault-injection
M Cukier, D Powell, J Ariat
IEEE Transactions on Computers 48 (7), 707-723, 1999
741999
Quantifying the cost of providing intrusion tolerance in group communication systems
HGV Ramasamy, P Pandey, J Lyons, M Cukier, WH Sanders
Proceedings International Conference on Dependable Systems and Networks, 229-238, 2002
692002
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace
T Wilson, D Maimon, B Sobesto, M Cukier
Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015
682015
A global-state-triggered fault injector for distributed system evaluation
R Chandra, RM Lefever, KR Joshi, M Cukier, WH Sanders
IEEE Transactions on Parallel and Distributed Systems 15 (7), 593-605, 2004
652004
Loki: A state-driven fault injector for distributed systems
R Chandra, RM Lefever, M Cukier, WH Sanders
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
652000
Risk and the five hard problems of cybersecurity
NM Scala, AC Reilly, PL Goethals, M Cukier
Risk Analysis 39 (10), 2119-2126, 2019
602019
An adaptive quality of service aware middleware for replicated services
S Krishnamurthy, WH Sanders, M Cukier
IEEE Transactions on Parallel and Distributed Systems 14 (11), 1112-1125, 2003
572003
Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games
M Coenraad, A Pellicone, DJ Ketelhut, M Cukier, J Plane, D Weintrop
Simulation & Gaming 51 (5), 586-611, 2020
552020
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors
A Testa, D Maimon, B Sobesto, M Cukier
Criminology & Public Policy 16 (3), 689-726, 2017
532017
Analysis of computer security incident data using time series models
E Condon, A He, M Cukier
2008 19th international symposium on software reliability engineering (ISSRE …, 2008
532008
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20