default search action
BibTeX records: Rock Stevens
@inproceedings{DBLP:conf/chi/StevensVDTQAM22, author = {Rock Stevens and Daniel Votipka and Josiah Dykstra and Fernando Tomlinson and Erin Quartararo and Colin Ahern and Michelle L. Mazurek}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {589:1--589:18}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3517559}, doi = {10.1145/3491102.3517559}, timestamp = {Fri, 29 Apr 2022 13:37:13 +0200}, biburl = {https://dblp.org/rec/conf/chi/StevensVDTQAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StevensKDM22, author = {Rock Stevens and Faris Bugra Kokulu and Adam Doup{\'{e}} and Michelle L. Mazurek}, title = {Above and Beyond: Organizational Efforts to Complement {U.S.} Digital Security Compliance Mandates}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-263/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/StevensKDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StevensDEM20, author = {Rock Stevens and Josiah Dykstra and Wendy Knox Everette and Michelle L. Mazurek}, title = {It Lurks Within: {A} Look at the Unexpected Security Implications of Compliance Programs}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {6}, pages = {51--58}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.3014291}, doi = {10.1109/MSEC.2020.3014291}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/StevensDEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StevensDECBFHM20, author = {Rock Stevens and Josiah Dykstra and Wendy Knox Everette and James Chapman and Garrett Bladow and Alexander Farmer and Kevin Halliday and Michelle L. Mazurek}, title = {Compliance Cautions: Investigating Security Issues Associated with {U.S.} Digital-Security Standards}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/compliance-cautions-investigating-security-issues-associated-with-u-s-digital-security-standards/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/StevensDECBFHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RedmilesWJKKMSM20, author = {Elissa M. Redmiles and Noel Warford and Amritha Jayanti and Aravind Koneru and Sean Kross and Miraida Morales and Rock Stevens and Michelle L. Mazurek}, editor = {Srdjan Capkun and Franziska Roesner}, title = {A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {89--108}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/RedmilesWJKKMSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/StevensVRAM19, author = {Rock Stevens and Daniel Votipka and Elissa M. Redmiles and Colin Ahern and Michelle L. Mazurek}, title = {Applied Digital Threat Modeling: It Works}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {35--42}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2909714}, doi = {10.1109/MSEC.2019.2909714}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/StevensVRAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/RedmilesMHKLMPR19, author = {Elissa M. Redmiles and Lisa N. Maszkiewicz and Emily Hwang and Dhruv Kuchhal and Everest Liu and Miraida Morales and Denis Peskov and Sudha Rao and Rock Stevens and Kristina Gligoric and Sean Kross and Michelle L. Mazurek and Hal Daum{\'{e}} III}, editor = {Kentaro Inui and Jing Jiang and Vincent Ng and Xiaojun Wan}, title = {Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts}, booktitle = {Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, {EMNLP-IJCNLP} 2019, Hong Kong, China, November 3-7, 2019}, pages = {4830--4841}, publisher = {Association for Computational Linguistics}, year = {2019}, url = {https://doi.org/10.18653/v1/D19-1489}, doi = {10.18653/V1/D19-1489}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/RedmilesMHKLMPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VotipkaSRHM18, author = {Daniel Votipka and Rock Stevens and Elissa M. Redmiles and Jeremy Hu and Michelle L. Mazurek}, title = {Hackers vs. Testers: {A} Comparison of Software Vulnerability Discovery Processes}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {374--391}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00003}, doi = {10.1109/SP.2018.00003}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/VotipkaSRHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StevensVRASM18, author = {Rock Stevens and Daniel Votipka and Elissa M. Redmiles and Colin Ahern and Patrick Sweeney and Michelle L. Mazurek}, editor = {William Enck and Adrienne Porter Felt}, title = {The Battle for New York: {A} Case Study of Applied Digital Threat Modeling at the Enterprise Level}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {621--637}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/stevens}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/StevensVRASM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MicinskiVSKMF17, author = {Kristopher K. Micinski and Daniel Votipka and Rock Stevens and Nikolaos Kofinas and Michelle L. Mazurek and Jeffrey S. Foster}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {User Interactions and Permission Use on Android}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {362--373}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3025706}, doi = {10.1145/3025453.3025706}, timestamp = {Tue, 06 Nov 2018 16:58:42 +0100}, biburl = {https://dblp.org/rec/conf/chi/MicinskiVSKMF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Stevens17, author = {Rock Stevens}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Identifying self-inflicted vulnerabilities: The operational implications of technology within {U.S.} combat systems}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {112--118}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167505}, doi = {10.1109/CYCONUS.2017.8167505}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Stevens17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StevensSRHHD17, author = {Rock Stevens and Octavian Suciu and Andrew Ruef and Sanghyun Hong and Michael W. Hicks and Tudor Dumitras}, title = {Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning}, journal = {CoRR}, volume = {abs/1701.04739}, year = {2017}, url = {http://arxiv.org/abs/1701.04739}, eprinttype = {arXiv}, eprint = {1701.04739}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StevensSRHHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/MosleyPDSBAJ07, author = {Shawn Mosley and Maxwell Potasznik and Kyle Davis and Rock Stevens and Michael Ballmann and Bernard Ancheta and Grant A. Jacoby}, editor = {Hamid R. Arabnia and Victor A. Clincy and Laurence Tianruo Yang}, title = {{FLIP} - Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline Hardware Implementation}, booktitle = {Proceedings of the 2007 International Conference on Wireless Networks, June 25-28, 2007, Las Vegas, Nevada, {USA}}, pages = {167--173}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Mon, 09 Feb 2009 10:38:02 +0100}, biburl = {https://dblp.org/rec/conf/icwn/MosleyPDSBAJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.