Michel Cukier

Orcid: 0000-0001-6250-4632

Affiliations:
  • University of Maryland, College Park, USA


According to our database1, Michel Cukier authored at least 77 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Nutrition Facts, Drug Facts, and Model Facts: Putting AI Ethics into Practice in Gun Violence Research.
CoRR, 2024

2023
S3C2 Summit 2023-06: Government Secure Supply Chain Summit.
CoRR, 2023

2022
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2022

Playing Aloud: Leveraging Game Commentary Culture for Playtesting.
Int. J. Gaming Comput. Mediat. Simulations, 2022

2021
Discovering features for detecting malicious websites: An empirical study.
Comput. Secur., 2021

2020
Special section on IST for ISSRE 2019.
Inf. Softw. Technol., 2020

An Approach for Preventing and Detecting Attacks in the Cloud.
Proceedings of the 13th IEEE/ACM International Conference on Utility and Cloud Computing, 2020

Designing Failure and Feedback within Puzzles.
Proceedings of the CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, Virtual Event, Canada, November 2-4, 2020, 2020

2019
Cluster-based vulnerability assessment of operating systems and web browsers.
Computing, 2019

Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models.
Comput. Secur., 2019

Identifying infected users via network traffic.
Comput. Secur., 2019

Predictably Deterrable? The Case of System Trespassers.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Comprehensive Evaluation of Webpage Content Features for Detecting Malicious Websites.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites.
Proceedings of the 15th European Dependable Computing Conference, 2019

2018
Correlating human traits and cyber security behavior intentions.
Comput. Secur., 2018

Process mining and hierarchical clustering to help intrusion alert visualization.
Comput. Secur., 2018

2017
Discovering Attackers Past Behavior to Generate Online Hyper-Alerts.
Braz. J. Inf. Syst., 2017

AVAMAT: AntiVirus and malware analysis tool.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Cluster-Based Vulnerability Assessment Applied to Operating Systems.
Proceedings of the 13th European Dependable Computing Conference, 2017

Application of Routine Activity Theory to Cyber Intrusion Location and Time.
Proceedings of the 13th European Dependable Computing Conference, 2017

2016
Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

2015
A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

An Improved Method for Anomaly-Based Network Scan Detection.
Proceedings of the Security and Privacy in Communication Networks, 2015

2013
Does Malware Detection Improve with Diverse AntiVirus Products? An Empirical Study.
Proceedings of the Computer Safety, Reliability, and Security, 2013

A study of the relationship between antivirus regressions and label changes.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Relationships between information security metrics: an empirical study.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Using Population Characteristics to Build Forecasting Models for Computer Security Incidents.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

2011
Characterizing Attackers and Attacks: An Empirical Study.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

DarkNOC: Dashboard for Honeypot Management.
Proceedings of the Past, 2011

How secure are networked office devices?
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2009
An evaluation of connection characteristics for separating network attacks.
Int. J. Secur. Networks, 2009

Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities.
IEEE Secur. Priv., 2009

Evaluating Files to Audit for Detecting Intrusions in FileSystem Data.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Analyzing the process of installing rogue software.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Experiences with building an intrusion-tolerant group communication system.
Softw. Pract. Exp., 2008

Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data.
Proceedings of the Computer Safety, 2008

Analysis of Computer Security Incident Data Using Time Series Models.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

On the Comparison of Network Attack Datasets: An Empirical Analysis.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

2007
Archetypal behavior in computer security.
J. Syst. Softw., 2007

A Comparison between Internal and External Malicious Traffic.
Proceedings of the ISSRE 2007, 2007

Applying Software Reliability Models on Security Incidents.
Proceedings of the ISSRE 2007, 2007

Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences.
Proceedings of the Information Security and Cryptology, 2007

Profiling Attacker Behavior Following SSH Compromises.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
An architecture for adaptive intrusion-tolerant applications.
Softw. Pract. Exp., 2006

Assessing the Attack Threat due to IRC Channels.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Workshop on Empirical Evaluation of Dependability and Security (WEEDS).
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

A Statistical Analysis of Attack Data to Separate Attacks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Automated Checking for Windows Host Vulnerabilities.
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005

An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
A Global-State-Triggered Fault Injector for Distributed System Evaluation.
IEEE Trans. Parallel Distributed Syst., 2004

Ferret: A Host Vulnerability Checking Tool.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

2003
An Adaptive Quality of Service Aware Middleware for Replicated Services.
IEEE Trans. Parallel Distributed Syst., 2003

AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
IEEE Trans. Computers, 2003

An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Probabilistic Validation of an Intrusion-Tolerant Replication System.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Performance Evaluation of a Probabilistic Replica Selection Algorithm.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

Passive Replication Schemes in Aqua.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol.
Proceedings of the Dependable Computing, 2002

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

An Adaptive Framework for Tunable Consistency and Timeliness Using Replication.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
An Adaptive Algorithm for Tolerating Value Faults and Crash Failures.
IEEE Trans. Parallel Distributed Syst., 2001

A Dynamic Replica Selection Algorithm for Tolerating Timing Faults.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector.
Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems, 2000

Loki: A State-Driven Fault Injector for Distributed Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Coverage Estimation Methods for Stratified Fault Injection.
IEEE Trans. Computers, 1999

Fault Injection based on a Partial View of the Global State of a Distributed System.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Building Dependable Distributed Applications Using AQUA.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

1998
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

1997
Probabilistic Verification of a Synchronous Round-Based Consensus Protocol.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

1996
On Stratified Sampling for High Coverage Estimations.
Proceedings of the Dependable Computing, 1996

1994
Software Reliability Analysis of Three Successive Generations of a Switching System.
Proceedings of the Dependable Computing, 1994


  Loading...