Claire Vishik

Orcid: 0009-0002-6466-8053

According to our database1, Claire Vishik authored at least 27 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
To Participate Or Not To Participate: An Investigation Of Strategic Participation In Standards.
CoRR, 2022

2019
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

2018
Ontology-Based Reasoning about the Trustworthiness of Cyber-Physical Systems.
CoRR, 2018

Reasoning about Smart City.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

Risk Engineering and Blockchain: Anticipating and Mitigating Risks.
Proceedings of the Business Information Systems Workshops, 2018

2015
Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain Analysis.
Proceedings of the ISSE 2015, 2015

Trust Evidence for IoT: Trust Establishment from Servers to Sensors.
Proceedings of the ISSE 2015, 2015

2013
Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing.
Decis. Support Syst., 2013

Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment.
Proceedings of the ISSE 2013, 2013

2012
A practical device authentication scheme using SRAM PUFs.
J. Cryptogr. Eng., 2012

Intention Semantics and Trust Evidence.
Proceedings of the ISSE 2012, 2012

Building Technologies that Help Cyber-Defense: Hardware-enabled Trust.
Proceedings of the ISSE 2012, 2012

2011
A Practical Device Authentication Scheme Using SRAM PUFs.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM.
Proceedings of the Trusted Systems - Third International Conference, 2011

Defining trust evidence: research directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Moving Toward Trustworthy Systems: R&D Essentials.
Computer, 2010

Silicon PUFs in Practice.
Proceedings of the ISSE 2010, 2010

Defining Threat Agents: Towards a More Complete Threat Analysis.
Proceedings of the ISSE 2010, 2010

Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysis.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Threat agents: a necessary component of threat analysis.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment.
Proceedings of the ISSE 2009, 2009

Future of Assurance: Ensuring that a System is Trustworthy.
Proceedings of the ISSE 2009, 2009

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009

2007
Infrastructure for Trusted Environment: In Search of a Solution.
Proceedings of the ISSE/SECURE 2007, 2007

1999
Knowledge sharing, quality, and intermediation.
Proceedings of the international joint conference on Work activities coordination and collaboration 1999, 1999


  Loading...