


default search action
SIW@CCS 2014: Scottsdale, Arizona, USA
- Robert Biddle, Bill Chu, Emerson R. Murphy-Hill, Heather Richter Lipford:

Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3152-4
Tools
- Erik E. Northrop, Heather Richter Lipford:

Exploring the Usability of Open Source Network Forensic Tools. 1-8 - Jeff Wilson, Judith M. Brown, Robert Biddle:

ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis. 9-16 - Heather Richter Lipford, Tyler Thomas, Bill Chu, Emerson R. Murphy-Hill:

Interactive Code Annotation for Security Vulnerability Detection. 17-22
Software Development
- Jim Witschey, Shundan Xiao, Emerson R. Murphy-Hill:

Technical and Personal Factors Influencing Developers' Adoption of Security Tools. 23-26 - Radu Vanciu, Ebrahim Khalaj, Marwan Abi-Antoun:

Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security Vulnerabilities. 27-34 - Tiffany Brooke Jordan, Brittany Johnson, Jim Witschey, Emerson R. Murphy-Hill:

Designing Interventions to Persuade Software Developers to Adopt Security Tools. 35-38
Operations
- Celeste Lyn Paul:

Human-Centered Study of a Network Operations Center: Experience Report and Lessons Learned. 39-42 - Sathya Chandran Sundaramurthy, Jacob Case, Tony Truong, Loai Zomlot, Marcel Hoffmann:

A Tale of Three Security Operation Centers. 43-50 - Mingyi Zhao, Jens Grossklags, Kai Chen:

An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program. 51-58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














