Rock Stevens

Orcid: 0000-0001-7884-7904

According to our database1, Rock Stevens authored at least 13 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2020
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs.
IEEE Secur. Priv., 2020

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.
Proceedings of the 29th USENIX Security Symposium, 2020

Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Applied Digital Threat Modeling: It Works.
IEEE Secur. Priv., 2019

Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

2018
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Proceedings of the 27th USENIX Security Symposium, 2018

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning.
CoRR, 2017

Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

User Interactions and Permission Use on Android.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2007
FLIP - Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline Hardware Implementation.
Proceedings of the 2007 International Conference on Wireless Networks, 2007


  Loading...