That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers S Oesch, S Ruoti Proceedings of the 29th USENIX Conference on Security Symposium, 2165-2182, 2020 | 73 | 2020 |
“It Basically Started Using Me:” An Observational Study of Password Manager Usage S Oesch, S Ruoti, J Simmons, A Gautam Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 22 | 2022 |
Systematization of password manageruse cases and design paradigms J Simmons, O Diallo, S Oesch, S Ruoti Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 17 | 2021 |
Testing SOAR tools in use RA Bridges, AE Rice, S Oesch, JA Nichols, C Watson, K Spakes, S Norem, ... Computers & Security 129, 103201, 2023 | 14 | 2023 |
The emperor’s new autofill framework: a security analysis of autofill on iOS and Android S Oesch, A Gautam, S Ruoti Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 12 | 2021 |
An assessment of the usability of machine learning based tools for the security operations center S Oesch, R Bridges, J Smith, J Beaver, J Goodall, K Huffer, C Miles, ... 2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020 | 12 | 2020 |
Understanding user perceptions of security and privacy for group chat: a survey of users in the US and UK S Oesch, R Abu-Salma, O Diallo, J Krämer, J Simmons, J Wu, S Ruoti Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 11 | 2020 |
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ... arXiv preprint arXiv:2012.09214, 2020 | 10 | 2020 |
Toward the detection of polyglot files L Koch, S Oesch, A Chaulagain, M Adkisson, S Erwin, B Weber Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022 | 6 | 2022 |
D2U: Data driven user emulation for the enhancement of cyber testing, training, and data set generation S Oesch, RA Bridges, M Verma, B Weber, O Diallo Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 17-26, 2021 | 6 | 2021 |
Nation scale mobile ad hoc network for normally isolated topologies S Oesch, M Schuchard 2019 international conference on internet of things (iThings) and IEEE green …, 2019 | 5 | 2019 |
User Perceptions of Security and Privacy for Group Chat S Oesch, R Abu-Salma, O Diallo, J Krämer, J Simmons, J Wu, S Ruoti Digital Threats: Research and Practice (DTRAP) 3 (2), 1-29, 2022 | 4 | 2022 |
A mathematical framework for evaluation of SOAR tools with limited survey data S Norem, AE Rice, S Erwin, RA Bridges, S Oesch, B Weber European Symposium on Research in Computer Security, 557-575, 2021 | 3 | 2021 |
The Path To Autonomous Cyber Defense S Oesch, P Austria, A Chaulagain, B Weber, C Watson, M Dixson, ... arXiv preprint arXiv:2404.10788, 2024 | 1 | 2024 |
Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware Detectors RA Bridges, S Oesch, MD Iannacone, KMT Huffer, B Jewell, JA Nichols, ... Digital Threats: Research and Practice 4 (2), 1-22, 2023 | 1 | 2023 |
What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity E Begoli, RA Bridges, S Oesch, KE Knight arXiv preprint arXiv:2105.06545, 2021 | 1 | 2021 |
That was then, this is now: A security evaluation of password generation, storage, and autofill in thirteen password managers S Oesch, S Ruoti arXiv preprint arXiv:1908.03296, 2019 | 1 | 2019 |
Reinforcement Learning-based Traffic Control to Optimize Energy Usage and Throughput (CRADA report) TP Karnowski, M Eicholtz, W Elwasif, R Ferrell, T Naughton III, TS Oesch, ... Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States), 2019 | 1 | 2019 |
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents S Oesch, A Chaulagain, B Weber, M Dixson, A Sadovnik, B Roberson, ... Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 91-99, 2024 | | 2024 |
On the Abuse and Detection of Polyglot Files L Koch, S Oesch, A Chaulagain, J Dixon, M Dixon, M Huettal, A Sadovnik, ... arXiv preprint arXiv:2407.01529, 2024 | | 2024 |