Michel Cukier
Affiliations: | Electrical Engineering | University of Maryland, College Park, College Park, MD |
Area:
Electronics and Electrical EngineeringGoogle:
"Michel Cukier"Children
Sign in to add traineeJesus Molina | grad student | 2007 | University of Maryland |
Robin G. Berthier | grad student | 2009 | University of Maryland |
Danielle Chrun | grad student | 2011 | University of Maryland |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Movahedi Y, Cukier M, Gashi I. (2020) Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities Ieee Transactions On Dependable and Secure Computing. 1-1 |
Scala NM, Reilly AC, Goethals PL, et al. (2019) Risk and the Five Hard Problems of Cybersecurity. Risk Analysis : An Official Publication of the Society For Risk Analysis |
Movahedi Y, Cukier M, Gashi I. (2019) Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models Computers & Security. 87: 101596 |
Movahedi Y, Cukier M, Andongabo A, et al. (2019) Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers Computing. 101: 139-160 |
Alvarenga SCd, Barbon S, Miani RS, et al. (2018) Process mining and hierarchical clustering to help intrusion alert visualization Computers & Security. 73: 474-491 |
Gratian M, Bandi S, Cukier M, et al. (2018) Correlating human traits and cyber security behavior intentions Computers & Security. 73: 345-358 |
Kawakani CT, Barbon S, Miani RS, et al. (2017) Discovering Attackers Past Behavior to Generate Online Hyper-Alerts Isys. 10: 122-147 |
Testa A, Maimon D, Sobesto B, et al. (2017) Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors Criminology and Public Policy. 16: 689-726 |
Miani RS, Zarpelao BB, Sobesto B, et al. (2016) A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues Proceedings of the Ieee Symposium On Reliable Distributed Systems. 2016: 296-305 |
Wilson T, Maimon D, Sobesto B, et al. (2015) The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace Journal of Research in Crime and Delinquency. 52: 829-855 |