Robert K. Cunningham

Orcid: 0000-0002-5837-6161

Affiliations:
  • MIT Lincoln Laboratory, Lexington, MA, USA


According to our database1, Robert K. Cunningham authored at least 38 papers between 1986 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2017, "For leadership in computer security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CoCoT: Collaborative Contact Tracing.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2022
Is a privacy crisis experienced, a privacy crisis avoided?
Commun. ACM, 2022

Adversary Safety by Construction in a Language of Cryptographic Protocols.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
A Research Road Map for Building Secure and Resilient Software-Intensive Systems.
IEEE Secur. Priv., 2021

2019
Blockchain Technology: What Is It Good for?
ACM Queue, 2019

SoK: Blockchain Technology and Its Potential Use Cases.
CoRR, 2019

2018
Don't Even Ask: Database Access Control through Query Control.
SIGMOD Rec., 2018

A Discussion on Security Education in Academia.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Building on the Success of Building Security In.
IEEE Secur. Priv., 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Panel: Building a Business around Secure Development.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

2016
SoK: Privacy on Mobile Devices - It's Complicated.
Proc. Priv. Enhancing Technol., 2016

IEEE SecDev 2016: Prioritizing Secure Development.
IEEE Secur. Priv., 2016

Catching MPC Cheaters: Identification and Openability.
IACR Cryptol. ePrint Arch., 2016

Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016

2015
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key.
IEEE Signal Process. Mag., 2015

Automated Assessment of Secure Search Systems.
ACM SIGOPS Oper. Syst. Rev., 2015

Cryptographically Secure Computation.
Computer, 2015

2014
Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

Robust keys from physical unclonable functions.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

2010
Why Measuring Security Is Hard.
IEEE Secur. Priv., 2010

Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
The Real Cost of Software Errors.
IEEE Secur. Priv., 2009

2007
Integrated Environment Management for Information Operations Testbeds.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007

Securing Current and Future Process Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

2005
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

2004
IREP++, A Faster Rule Learning Algorithm.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

2003
A taxonomy of computer worms.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

Detection of injected, dynamically generated, and obfuscated malicious code.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

2002
Fusing A Heterogeneous Alert Stream Into Scenarios.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Detecting and displaying novel computer attacks with Macroscope.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Accurately Detecting Source Code of Attacks That Increase Privilege.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

2000
Improving intrusion detection performance using keyword selection and neural networks.
Comput. Networks, 2000

1999
Results of the DARPA 1998 Offline Intrusion Detection Evaluation.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

1995
Neural processing of targets in visible, multispectral IR and SAR imagery.
Neural Networks, 1995

1994
Diffusion-enhancement bilayer: Realizing long-range apparent motion and spatiotemporal grouping in a neural architecture.
Neural Networks, 1994

1988
Neural Analog Diffusion-Enhancement Layer and Spatio-Temporal Grouping in Early Vision.
Proceedings of the Advances in Neural Information Processing Systems 1, 1988

1986
An Object-Oriented Architecture for Intelligent Tutoring Systems.
Proceedings of the Conference on Object-Oriented Programming Systems, 1986


  Loading...