Correlating human traits and cyber security behavior intentions M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther computers & security 73, 345-358, 2018 | 323 | 2018 |
AQuA: An adaptive architecture that provides dependable distributed objects M Cukier, J Ren, C Sabnis, D Henke, J Pistole, WH Sanders, DE Bakken, ... Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat …, 1998 | 288 | 1998 |
Nfsight: netflow-based network awareness tool R Berthier, M Cukier, M Hiltunen, D Kormann, G Vesonder, D Sheleheda | 164 | 2010 |
An experimental evaluation to determine if port scans are precursors to an attack S Panjwani, S Tan, KM Jarrin, M Cukier 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 154 | 2005 |
Restrictive deterrent effects of a warning banner in an attacked computer system D Maimon, M Alper, B Sobesto, M Cukier Criminology 52 (1), 33-59, 2014 | 153 | 2014 |
Profiling attacker behavior following SSH compromises D Ramsbrock, R Berthier, M Cukier 37th Annual IEEE/IFIP international conference on dependable systems and …, 2007 | 151 | 2007 |
Probabilistic validation of an intrusion-tolerant replication system S Singh, M Cukier, WH Sanders DSN, 615-624, 2003 | 98 | 2003 |
AQuA: An adaptive architecture that provides dependable distributed objects Y Ren, DE Bakken, T Courtney, M Cukier, DA Karr, P Rubel, C Sabnis, ... IEEE Transactions on Computers 52 (1), 31-50, 2003 | 96 | 2003 |
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective D Maimon, A Kamerdze, M Cukier, B Sobesto British Journal of Criminology 53 (2), 319-343, 2013 | 81 | 2013 |
Assessing the attack threat due to IRC channels R Meyer, M Cukier International Conference on Dependable Systems and Networks (DSN'06), 467-472, 2006 | 81 | 2006 |
Coverage estimation methods for stratified fault-injection M Cukier, D Powell, J Ariat IEEE Transactions on Computers 48 (7), 707-723, 1999 | 74 | 1999 |
Quantifying the cost of providing intrusion tolerance in group communication systems HGV Ramasamy, P Pandey, J Lyons, M Cukier, WH Sanders Proceedings International Conference on Dependable Systems and Networks, 229-238, 2002 | 69 | 2002 |
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace T Wilson, D Maimon, B Sobesto, M Cukier Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015 | 68 | 2015 |
Risk and the five hard problems of cybersecurity NM Scala, AC Reilly, PL Goethals, M Cukier Risk Analysis 39 (10), 2119-2126, 2019 | 67 | 2019 |
A global-state-triggered fault injector for distributed system evaluation R Chandra, RM Lefever, KR Joshi, M Cukier, WH Sanders IEEE Transactions on Parallel and Distributed Systems 15 (7), 593-605, 2004 | 65 | 2004 |
Loki: A state-driven fault injector for distributed systems R Chandra, RM Lefever, M Cukier, WH Sanders Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000 | 64 | 2000 |
Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games M Coenraad, A Pellicone, DJ Ketelhut, M Cukier, J Plane, D Weintrop Simulation & Gaming 51 (5), 586-611, 2020 | 60 | 2020 |
An adaptive quality of service aware middleware for replicated services S Krishnamurthy, WH Sanders, M Cukier IEEE Transactions on Parallel and Distributed Systems 14 (11), 1112-1125, 2003 | 58 | 2003 |
Process mining and hierarchical clustering to help intrusion alert visualization SC De Alvarenga, S Barbon Jr, RS Miani, M Cukier, BB Zarpelão Computers & Security 73, 474-491, 2018 | 53 | 2018 |
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors A Testa, D Maimon, B Sobesto, M Cukier Criminology & Public Policy 16 (3), 689-726, 2017 | 53 | 2017 |