Sean Oesch

Orcid: 0000-0002-6909-1022

According to our database1, Sean Oesch authored at least 19 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Testing SOAR tools in use.
Comput. Secur., June, 2023

Poster: Cognitive Cyber - Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing Environments.
Proceedings of the 17th ACM International Conference on Distributed and Event-based Systems, 2023

AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Toward the Detection of Polyglot Files.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

"It Basically Started Using Me: " An Observational Study of Password Manager Usage.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity.
CoRR, 2021

D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Systematization of Password ManagerUse Cases and Design Paradigms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection.
CoRR, 2020

That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers.
Proceedings of the 29th USENIX Security Symposium, 2020

An Evaluation of Caching in Nation Scale, Normally Isolated Mobile Ad Hoc Networks.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

An Integrated Platform for Collaborative Data Analytics.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Estimating Vehicle Fuel Economy from Overhead Camera Imagery and Application for Traffic Control.
Proceedings of the Intelligent Robotics and Industrial Applications using Computer Vision 2020, 2020

Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers.
CoRR, 2019

Nation Scale Mobile Ad Hoc Network for Normally Isolated Topologies.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019


  Loading...