Michel Cukier

Affiliations: 
Electrical Engineering University of Maryland, College Park, College Park, MD 
Area:
Electronics and Electrical Engineering
Google:
"Michel Cukier"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Movahedi Y, Cukier M, Gashi I. (2020) Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities Ieee Transactions On Dependable and Secure Computing. 1-1
Scala NM, Reilly AC, Goethals PL, et al. (2019) Risk and the Five Hard Problems of Cybersecurity. Risk Analysis : An Official Publication of the Society For Risk Analysis
Movahedi Y, Cukier M, Gashi I. (2019) Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models Computers & Security. 87: 101596
Movahedi Y, Cukier M, Andongabo A, et al. (2019) Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers Computing. 101: 139-160
Alvarenga SCd, Barbon S, Miani RS, et al. (2018) Process mining and hierarchical clustering to help intrusion alert visualization Computers & Security. 73: 474-491
Gratian M, Bandi S, Cukier M, et al. (2018) Correlating human traits and cyber security behavior intentions Computers & Security. 73: 345-358
Kawakani CT, Barbon S, Miani RS, et al. (2017) Discovering Attackers Past Behavior to Generate Online Hyper-Alerts Isys. 10: 122-147
Testa A, Maimon D, Sobesto B, et al. (2017) Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors Criminology and Public Policy. 16: 689-726
Miani RS, Zarpelao BB, Sobesto B, et al. (2016) A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues Proceedings of the Ieee Symposium On Reliable Distributed Systems. 2016: 296-305
Wilson T, Maimon D, Sobesto B, et al. (2015) The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace Journal of Research in Crime and Delinquency. 52: 829-855
See more...