BibTeX records: Rock Stevens

download as .bib file

@inproceedings{DBLP:conf/chi/StevensVDTQAM22,
  author       = {Rock Stevens and
                  Daniel Votipka and
                  Josiah Dykstra and
                  Fernando Tomlinson and
                  Erin Quartararo and
                  Colin Ahern and
                  Michelle L. Mazurek},
  editor       = {Simone D. J. Barbosa and
                  Cliff Lampe and
                  Caroline Appert and
                  David A. Shamma and
                  Steven Mark Drucker and
                  Julie R. Williamson and
                  Koji Yatani},
  title        = {How Ready is Your Ready? Assessing the Usability of Incident Response
                  Playbook Frameworks},
  booktitle    = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems,
                  New Orleans, LA, USA, 29 April 2022 - 5 May 2022},
  pages        = {589:1--589:18},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491102.3517559},
  doi          = {10.1145/3491102.3517559},
  timestamp    = {Fri, 29 Apr 2022 13:37:13 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/StevensVDTQAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StevensKDM22,
  author       = {Rock Stevens and
                  Faris Bugra Kokulu and
                  Adam Doup{\'{e}} and
                  Michelle L. Mazurek},
  title        = {Above and Beyond: Organizational Efforts to Complement {U.S.} Digital
                  Security Compliance Mandates},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-263/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/StevensKDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StevensDEM20,
  author       = {Rock Stevens and
                  Josiah Dykstra and
                  Wendy Knox Everette and
                  Michelle L. Mazurek},
  title        = {It Lurks Within: {A} Look at the Unexpected Security Implications
                  of Compliance Programs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {6},
  pages        = {51--58},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.3014291},
  doi          = {10.1109/MSEC.2020.3014291},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StevensDEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StevensDECBFHM20,
  author       = {Rock Stevens and
                  Josiah Dykstra and
                  Wendy Knox Everette and
                  James Chapman and
                  Garrett Bladow and
                  Alexander Farmer and
                  Kevin Halliday and
                  Michelle L. Mazurek},
  title        = {Compliance Cautions: Investigating Security Issues Associated with
                  {U.S.} Digital-Security Standards},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/compliance-cautions-investigating-security-issues-associated-with-u-s-digital-security-standards/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/StevensDECBFHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RedmilesWJKKMSM20,
  author       = {Elissa M. Redmiles and
                  Noel Warford and
                  Amritha Jayanti and
                  Aravind Koneru and
                  Sean Kross and
                  Miraida Morales and
                  Rock Stevens and
                  Michelle L. Mazurek},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {A Comprehensive Quality Evaluation of Security and Privacy Advice
                  on the Web},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {89--108},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RedmilesWJKKMSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StevensVRAM19,
  author       = {Rock Stevens and
                  Daniel Votipka and
                  Elissa M. Redmiles and
                  Colin Ahern and
                  Michelle L. Mazurek},
  title        = {Applied Digital Threat Modeling: It Works},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {35--42},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2909714},
  doi          = {10.1109/MSEC.2019.2909714},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StevensVRAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/RedmilesMHKLMPR19,
  author       = {Elissa M. Redmiles and
                  Lisa N. Maszkiewicz and
                  Emily Hwang and
                  Dhruv Kuchhal and
                  Everest Liu and
                  Miraida Morales and
                  Denis Peskov and
                  Sudha Rao and
                  Rock Stevens and
                  Kristina Gligoric and
                  Sean Kross and
                  Michelle L. Mazurek and
                  Hal Daum{\'{e}} III},
  editor       = {Kentaro Inui and
                  Jing Jiang and
                  Vincent Ng and
                  Xiaojun Wan},
  title        = {Comparing and Developing Tools to Measure the Readability of Domain-Specific
                  Texts},
  booktitle    = {Proceedings of the 2019 Conference on Empirical Methods in Natural
                  Language Processing and the 9th International Joint Conference on
                  Natural Language Processing, {EMNLP-IJCNLP} 2019, Hong Kong, China,
                  November 3-7, 2019},
  pages        = {4830--4841},
  publisher    = {Association for Computational Linguistics},
  year         = {2019},
  url          = {https://doi.org/10.18653/v1/D19-1489},
  doi          = {10.18653/V1/D19-1489},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/RedmilesMHKLMPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VotipkaSRHM18,
  author       = {Daniel Votipka and
                  Rock Stevens and
                  Elissa M. Redmiles and
                  Jeremy Hu and
                  Michelle L. Mazurek},
  title        = {Hackers vs. Testers: {A} Comparison of Software Vulnerability Discovery
                  Processes},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {374--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00003},
  doi          = {10.1109/SP.2018.00003},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VotipkaSRHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StevensVRASM18,
  author       = {Rock Stevens and
                  Daniel Votipka and
                  Elissa M. Redmiles and
                  Colin Ahern and
                  Patrick Sweeney and
                  Michelle L. Mazurek},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {The Battle for New York: {A} Case Study of Applied Digital Threat
                  Modeling at the Enterprise Level},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {621--637},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/stevens},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StevensVRASM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MicinskiVSKMF17,
  author       = {Kristopher K. Micinski and
                  Daniel Votipka and
                  Rock Stevens and
                  Nikolaos Kofinas and
                  Michelle L. Mazurek and
                  Jeffrey S. Foster},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {User Interactions and Permission Use on Android},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017},
  pages        = {362--373},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3025453.3025706},
  doi          = {10.1145/3025453.3025706},
  timestamp    = {Tue, 06 Nov 2018 16:58:42 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/MicinskiVSKMF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Stevens17,
  author       = {Rock Stevens},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Identifying self-inflicted vulnerabilities: The operational implications
                  of technology within {U.S.} combat systems},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {112--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167505},
  doi          = {10.1109/CYCONUS.2017.8167505},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Stevens17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StevensSRHHD17,
  author       = {Rock Stevens and
                  Octavian Suciu and
                  Andrew Ruef and
                  Sanghyun Hong and
                  Michael W. Hicks and
                  Tudor Dumitras},
  title        = {Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1701.04739},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.04739},
  eprinttype    = {arXiv},
  eprint       = {1701.04739},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/StevensSRHHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/MosleyPDSBAJ07,
  author       = {Shawn Mosley and
                  Maxwell Potasznik and
                  Kyle Davis and
                  Rock Stevens and
                  Michael Ballmann and
                  Bernard Ancheta and
                  Grant A. Jacoby},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy and
                  Laurence Tianruo Yang},
  title        = {{FLIP} - Forward Looking Intrusion Protection for Mobile Devices via
                  Snort-Inline Hardware Implementation},
  booktitle    = {Proceedings of the 2007 International Conference on Wireless Networks,
                  June 25-28, 2007, Las Vegas, Nevada, {USA}},
  pages        = {167--173},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Mon, 09 Feb 2009 10:38:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/MosleyPDSBAJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}