Michel Cukier
Orcid: 0000-0001-6250-4632Affiliations:
- University of Maryland, College Park, USA
According to our database1,
Michel Cukier
authored at least 82 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
5
1
2
1
1
3
2
1
2
1
1
1
1
2
1
1
1
2
3
3
2
2
3
2
3
2
5
4
4
2
1
2
6
1
2
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on enre.umd.edu
On csauthors.net:
Bibliography
2024
Nutrition facts, drug facts, and model facts: putting AI ethics into practice in gun violence research.
J. Am. Medical Informatics Assoc., 2024
Int. J. Child Comput. Interact., 2024
Equitable Access to Cybersecurity Education: A Case Study of Underserved Middle School Students.
Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1, 2024
2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Gaming Comput. Mediat. Simulations, 2022
2021
Comput. Secur., 2021
2020
Proceedings of the 13th IEEE/ACM International Conference on Utility and Cloud Computing, 2020
Proceedings of the CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play, Virtual Event, Canada, November 2-4, 2020, 2020
2019
Computing, 2019
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models.
Comput. Secur., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
A Comprehensive Evaluation of Webpage Content Features for Detecting Malicious Websites.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019
Proceedings of the 15th European Dependable Computing Conference, 2019
2018
Comput. Secur., 2018
Comput. Secur., 2018
2017
Braz. J. Inf. Syst., 2017
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017
Proceedings of the 13th European Dependable Computing Conference, 2017
Proceedings of the 13th European Dependable Computing Conference, 2017
2016
Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
2015
A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
2013
Proceedings of the Computer Safety, Reliability, and Security, 2013
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
Using Population Characteristics to Build Forecasting Models for Computer Security Incidents.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
2011
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2009
Int. J. Secur. Networks, 2009
Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities.
IEEE Secur. Priv., 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Softw. Pract. Exp., 2008
Proceedings of the Computer Safety, 2008
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
2007
Proceedings of the ISSRE 2007, 2007
Proceedings of the ISSRE 2007, 2007
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences.
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
Softw. Pract. Exp., 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
2005
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
IEEE Trans. Parallel Distributed Syst., 2004
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004
2003
IEEE Trans. Parallel Distributed Syst., 2003
IEEE Trans. Computers, 2003
An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002
Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol.
Proceedings of the Dependable Computing, 2002
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
IEEE Trans. Parallel Distributed Syst., 2001
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001
2000
Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
1999
IEEE Trans. Computers, 1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999
1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
1997
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997
1996
Proceedings of the Dependable Computing, 1996
1994
Proceedings of the Dependable Computing, 1994