Author of the publication

Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts.

, , , , , , and . CSET @ USENIX Security Symposium, page 65-70. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Free" as in Freedom to Protest?, , , , , , , , and . IEEE Secur. Priv., 20 (5): 16-21 (2022)Defending Web Servers Against Flash Crowd Attacks., , , , , and . ICNP, page 1-2. IEEE, (2019)Understanding DNS Query Composition at B-Root., and . CoRR, (2023)Teaching Cybersecurity with DeterLab., and . IEEE Secur. Priv., 10 (1): 73-76 (2012)Building Reputations for Internet Clients., and . STM, volume 179 of Electronic Notes in Theoretical Computer Science, page 17-30. Elsevier, (2006)Using Episodic Memory for User Authentication., , , , and . ACM Trans. Priv. Secur., 22 (2): 11:1-11:34 (2019)The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study., , , , , , , , and . IEEE Secur. Priv., 20 (1): 87-95 (2022)Perspectives on the SolarWinds Incident., , , , , , , , , and . IEEE Secur. Priv., 19 (2): 7-13 (2021)An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags., , , , and . EuroS&P Workshops, page 56-65. IEEE, (2020)Using Terminal Histories to Monitor Student Progress on Hands-on Exercises., , , , , and . SIGCSE, page 866-872. ACM, (2020)