Eugene Y. Vasserman

Orcid: 0000-0002-2420-4329

Affiliations:
  • Kansas State University, USA


According to our database1, Eugene Y. Vasserman authored at least 40 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Psychology of GPT-4: Moderately anxious, slightly masculine, honest, and humble.
CoRR, 2024

On the Value of Labeled Data and Symbolic Methods for Hidden Neuron Activation Analysis.
Proceedings of the Neural-Symbolic Learning and Reasoning - 18th International Conference, 2024

2023
Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU.
CoRR, 2023

Understanding CNN Hidden Neuron Activations Using Structured Background Knowledge and Deductive Reasoning.
CoRR, 2023

2021
Side-channel Programming for Software Integrity Checking.
EAI Endorsed Trans. Security Safety, 2021

Review of the Security of Backward-Compatible Automotive Inter-ECU Communication.
IEEE Access, 2021

2020
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems.
EAI Endorsed Trans. Security Safety, 2020

Time series anomaly detection in medical break-the-glass.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

2019
An Extended Survey on Vehicle Security.
CoRR, 2019

2018
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR.
Proc. Priv. Enhancing Technol., 2018

eyeDNS: Monitoring a University Campus Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
A Reference Separation Architecture for Mixed-Criticality Medical and IoT Devices.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

Gray-Box Software Integrity Checking via Side-Channels.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Flexible Authorization Architecture for Systems of Interoperable Medical Devices.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Safety-Focused Security Requirements Elicitation for Medical Device Software.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems.
Proceedings of the Security and Privacy in Communication Networks, 2015

Requirement Engineering for Functional Alarm System for Interoperable Medical Devices.
Proceedings of the Computer Safety, Reliability, and Security, 2015

2014
Spreading the word: introducing pre-service teachers to programming in the K12 classroom.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Functional Alarms for Systems of Interoperable Medical Devices.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Retrofitting Communication Security into a Publish/Subscribe Middleware Platform.
Proceedings of the Software Engineering in Health Care - 4th International Symposium, 2014

2013
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013

Improved group off-the-record messaging.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Foundational Security Principles for Medical Application Platforms - (Extended Abstract).
Proceedings of the Information Security Applications - 14th International Workshop, 2013

The usability of truecrypt, or how i learned to stop whining and fix an interface.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Security and Interoperable-Medical-Device Systems, Part 1.
IEEE Secur. Priv., 2012

Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification.
IEEE Secur. Priv., 2012

One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Rationale and Architecture Principles for Medical Application Platforms.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

2010
How much anonymity does network latency leak?
ACM Trans. Inf. Syst. Secur., 2010

Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Silent Knock : practical, provably undetectable authentication.
Int. J. Inf. Sec., 2009

Membership-concealing overlay networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2007
Combating Double-Spending Using Cooperative P2P Systems.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

SilentKnock: Practical, Provably Undetectable Authentication.
Proceedings of the Computer Security, 2007

2006
On the effectiveness of <i>k</i>;-anonymity against traffic analysis and surveillance.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006


  Loading...