Restrictive deterrent effects of a warning banner in an attacked computer system D Maimon, M Alper, B Sobesto, M Cukier Criminology 52 (1), 33-59, 2014 | 159 | 2014 |
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective D Maimon, A Kamerdze, M Cukier, B Sobesto British Journal of Criminology 53 (2), 319-343, 2013 | 88 | 2013 |
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace T Wilson, D Maimon, B Sobesto, M Cukier Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015 | 71 | 2015 |
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors A Testa, D Maimon, B Sobesto, M Cukier Criminology & Public Policy 16 (3), 689-726, 2017 | 56 | 2017 |
Characterizing attackers and attacks: An empirical study G Salles-Loustau, R Berthier, E Collange, B Sobesto, M Cukier 2011 IEEE 17th Pacific Rim international symposium on dependable computing …, 2011 | 37 | 2011 |
Does malware detection improve with diverse antivirus products? an empirical study I Gashi, B Sobesto, V Stankovic, M Cukier Computer Safety, Reliability, and Security: 32nd International Conference …, 2013 | 20 | 2013 |
A study of the relationship between antivirus regressions and label changes I Gashi, B Sobesto, S Mason, V Stankovic, M Cukier 2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013 | 18 | 2013 |
{DarkNOC}: dashboard for honeypot management B Sobesto, M Cukier, M Hiltunen, D Kormann, G Vesonder, R Berthier 25th Large Installation System Administration Conference (LISA 11), 2011 | 15 | 2011 |
Comparing detection capabilities of antivirus products: an empirical study with different versions of products from the same vendors A Algaith, I Gashi, B Sobesto, M Cukier, S Haxhijaha, G Bajrami 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 12 | 2016 |
Predictably deterrable? The case of system trespassers D Maimon, A Testa, B Sobesto, M Cukier, W Ren Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019 | 11 | 2019 |
A practical experience on evaluating intrusion prevention system event data as indicators of security issues RS Miani, BB Zarpelao, B Sobesto, M Cukier 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 296-305, 2015 | 9 | 2015 |
Empirical studies based on honeypots for characterizing attackers behavior B Sobesto University of Maryland, College Park, 2015 | 5 | 2015 |
Are computer focused crimes impacted by system configurations? an empirical study B Sobesto, M Cukier, D Maimon 2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012 | 2 | 2012 |
Diversity with AntiVirus products: Additional empirical studies I Gashi, V Stankovic, M Cukier, B Sobesto | 1 | 2012 |
Technical report: Does Malware Detection Improve with Diverse Antivirus Products? An Empirical Study M Cukier, I Gashi, B Sobesto, V Stankovic | | 2013 |