default search action
Michel Cukier
Person information
- affiliation: University of Maryland, College Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Ekta Shokeen, Anthony J. Pellicone, David Weintrop, Diane Jass Ketelhut, Michel Cukier, Jandelyn Dawn Plane, Caro Williams-Pierce:
Children's approaches to solving puzzles in videogames. Int. J. Child Comput. Interact. 40: 100635 (2024) - [j21]Jessica Zhu, Michel Cukier, Joseph Richardson Jr.:
Nutrition facts, drug facts, and model facts: putting AI ethics into practice in gun violence research. J. Am. Medical Informatics Assoc. 31(10): 2414-2421 (2024) - [c56]Madison Thomas, Erynn Elmore, Brenda Chavez, Ronaisha Ruth, Charlotte Avery, Michel Cukier, Veronica Cateté:
Equitable Access to Cybersecurity Education: A Case Study of Underserved Middle School Students. ITiCSE (1) 2024 - [i5]Jessica Zhu, Michel Cukier, Joseph Richardson Jr.:
Nutrition Facts, Drug Facts, and Model Facts: Putting AI Ethics into Practice in Gun Violence Research. CoRR abs/2402.09286 (2024) - [i4]Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. CoRR abs/2405.08762 (2024) - [i3]Jessica Zhu, Iain Cruickshank, Michel Cukier:
DocNet: Semantic Structure in Inductive Bias Detection Models. CoRR abs/2406.10965 (2024) - [i2]Nusrat Zahan, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2023-11: Industry Secure Supply Chain Summit. CoRR abs/2408.16529 (2024) - 2023
- [i1]William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-06: Government Secure Supply Chain Summit. CoRR abs/2308.06850 (2023) - 2022
- [j20]Anthony Pellicone, David Weintrop, Diane Jass Ketelhut, Ekta Shokeen, Michel Cukier, Jandelyn Dawn Plane, Firoozeh Rahimian:
Playing Aloud: Leveraging Game Commentary Culture for Playtesting. Int. J. Gaming Comput. Mediat. Simulations 14(1): 1-16 (2022) - [j19]Yazdan Movahedi, Michel Cukier, Ilir Gashi:
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(2): 1181-1193 (2022) - 2021
- [j18]John McGahagan IV, Darshan Bhansali, Ciro Pinto-Coelho, Michel Cukier:
Discovering features for detecting malicious websites: An empirical study. Comput. Secur. 109: 102374 (2021) - 2020
- [j17]Barbara Gallina, Michel Cukier:
Special section on IST for ISSRE 2019. Inf. Softw. Technol. 128: 106404 (2020) - [c55]Ekta Shokeen, Anthony Pellicone, David Weintrop, Diane Jass Ketelhut, Caro Williams-Pierce, Jandelyn Dawn Plane, Michel Cukier:
Designing Failure and Feedback within Puzzles. CHI PLAY (Companion) 2020: 370-374 - [c54]Louis-Henri Merino, Michel Cukier:
An Approach for Preventing and Detecting Attacks in the Cloud. UCC 2020: 165-175
2010 – 2019
- 2019
- [j16]Margaret Gratian, Darshan Bhansali, Michel Cukier, Josiah Dykstra:
Identifying infected users via network traffic. Comput. Secur. 80: 306-316 (2019) - [j15]Yazdan Movahedi, Michel Cukier, Ilir Gashi:
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. Comput. Secur. 87 (2019) - [j14]Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi:
Cluster-based vulnerability assessment of operating systems and web browsers. Computing 101(2): 139-160 (2019) - [c53]John McGahagan IV, Darshan Bhansali, Margaret Gratian, Michel Cukier:
A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites. EDCC 2019: 75-82 - [c52]John McGahagan IV, Darshan Bhansali, Ciro Pinto-Coelho, Michel Cukier:
A Comprehensive Evaluation of Webpage Content Features for Detecting Malicious Websites. LADC 2019: 1-10 - [c51]David Maimon, Alexander Testa, Bertrand Sobesto, Michel Cukier, Wuling Ren:
Predictably Deterrable? The Case of System Trespassers. SpaCCS Workshops 2019: 317-330 - [e3]Katinka Wolter, Ina Schieferdecker, Barbara Gallina, Michel Cukier, Roberto Natella, Naghmeh Ramezani Ivaki, Nuno Laranjeiro:
30th IEEE International Symposium on Software Reliability Engineering, ISSRE 2019, Berlin, Germany, October 28-31, 2019. IEEE 2019, ISBN 978-1-7281-4982-0 [contents] - [e2]Katinka Wolter, Ina Schieferdecker, Barbara Gallina, Michel Cukier, Roberto Natella, Naghmeh Ramezani Ivaki, Nuno Laranjeiro:
IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops 2019, Berlin, Germany, October 27-30, 2019. IEEE 2019, ISBN 978-1-7281-5138-0 [contents] - 2018
- [j13]Margaret Gratian, Sruthi Bandi, Michel Cukier, Josiah Dykstra, Amy Ginther:
Correlating human traits and cyber security behavior intentions. Comput. Secur. 73: 345-358 (2018) - [j12]Sean Carlisto de Alvarenga, Sylvio Barbon, Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão:
Process mining and hierarchical clustering to help intrusion alert visualization. Comput. Secur. 73: 474-491 (2018) - 2017
- [j11]Cláudio Toshio Kawakani, Sylvio Barbon, Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão:
Discovering Attackers Past Behavior to Generate Online Hyper-Alerts. Braz. J. Inf. Syst. 10(1): 122-147 (2017) - [c50]Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi:
Cluster-Based Vulnerability Assessment Applied to Operating Systems. EDCC 2017: 18-25 - [c49]Kevin Bock, Sydnee Shannon, Yazdan Movahedi, Michel Cukier:
Application of Routine Activity Theory to Cyber Intrusion Location and Time. EDCC 2017: 139-146 - [c48]Pasha Shahegh, Tommy Dietz, Michel Cukier, Areej Algaith, Attila Brozik, Ilir Gashi:
AVAMAT: AntiVirus and malware analysis tool. NCA 2017: 365-368 - 2016
- [c47]Areej Algaith, Ilir Gashi, Bertrand Sobesto, Michel Cukier, Selman Haxhijaha, Gazmend Bajrami:
Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. DSN Workshops 2016: 48-53 - [c46]Edward Condon, Michel Cukier:
Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions. ISSRE 2016: 287-297 - 2015
- [c45]Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier:
An Improved Method for Anomaly-Based Network Scan Detection. SecureComm 2015: 385-400 - [c44]Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Bertrand Sobesto, Michel Cukier:
A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues. SRDS 2015: 296-305 - 2013
- [c43]Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes:
Relationships between information security metrics: an empirical study. CSIIRW 2013: 22 - [c42]Ilir Gashi, Bertrand Sobesto, Stephen Mason, Vladimir Stankovic, Michel Cukier:
A study of the relationship between antivirus regressions and label changes. ISSRE 2013: 441-450 - [c41]Ilir Gashi, Bertrand Sobesto, Vladimir Stankovic, Michel Cukier:
Does Malware Detection Improve with Diverse AntiVirus Products? An Empirical Study. SAFECOMP 2013: 94-105 - 2012
- [c40]Edward Condon, Michel Cukier:
Using Population Characteristics to Build Forecasting Models for Computer Security Incidents. ISSRE 2012: 71-80 - [c39]Bertrand Sobesto, Michel Cukier, David Maimon:
Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study. ISSRE 2012: 191-200 - [e1]Robert S. Swarz, Philip Koopman, Michel Cukier:
IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1624-8 [contents] - 2011
- [c38]Edward Condon, Emily Cummins, Zaïna Afoulki, Michel Cukier:
How secure are networked office devices? DSN 2011: 465-472 - [c37]Bertrand Sobesto, Michel Cukier, Matti A. Hiltunen, Dave Kormann, Gregg Vesonder, Robin Berthier:
DarkNOC: Dashboard for Honeypot Management. LISA 2011 - [c36]Gabriel Salles-Loustau, Robin Berthier, Etienne Collange, Bertrand Sobesto, Michel Cukier:
Characterizing Attackers and Attacks: An Empirical Study. PRDC 2011: 174-183
2000 – 2009
- 2009
- [j10]Michel Cukier, Susmit Panjwani:
Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. IEEE Secur. Priv. 7(1): 42-48 (2009) - [j9]Robin Berthier, Michel Cukier:
An evaluation of connection characteristics for separating network attacks. Int. J. Secur. Networks 4(1/2): 110-124 (2009) - [c35]Robin Berthier, Jorge Arjona, Michel Cukier:
Analyzing the process of installing rogue software. DSN 2009: 560-565 - [c34]Jesus Molina, Michel Cukier:
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. NCA 2009: 163-170 - 2008
- [j8]HariGovind V. Ramasamy, Prashant Pandey, Michel Cukier, William H. Sanders:
Experiences with building an intrusion-tolerant group communication system. Softw. Pract. Exp. 38(6): 639-666 (2008) - [c33]Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda:
On the Comparison of Network Attack Datasets: An Empirical Analysis. HASE 2008: 39-48 - [c32]Danielle Chrun, Michel Cukier, Gerry Sneeringer:
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. HASE 2008: 49-58 - [c31]Robin Berthier, Michel Cukier:
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. HASE 2008: 59-68 - [c30]Edward Condon, Angela He, Michel Cukier:
Analysis of Computer Security Incident Data Using Time Series Models. ISSRE 2008: 77-86 - [c29]Danielle Chrun, Michel Cukier, Gerry Sneeringer:
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. SAFECOMP 2008: 221-234 - 2007
- [j7]Shalom N. Rosenfeld, Ioana Rus, Michel Cukier:
Archetypal behavior in computer security. J. Syst. Softw. 80(10): 1594-1606 (2007) - [c28]Daniel Ramsbrock, Robin Berthier, Michel Cukier:
Profiling Attacker Behavior Following SSH Compromises. DSN 2007: 119-124 - [c27]Jesus Molina, Xavier Chorin, Michel Cukier:
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. ICISC 2007: 144-155 - [c26]Michel Cukier, Susmit Panjwani:
A Comparison between Internal and External Malicious Traffic. ISSRE 2007: 109-114 - [c25]Edward Condon, Michel Cukier, Tao He:
Applying Software Reliability Models on Security Incidents. ISSRE 2007: 159-168 - 2006
- [j6]Partha P. Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar:
An architecture for adaptive intrusion-tolerant applications. Softw. Pract. Exp. 36(11-12): 1331-1354 (2006) - [c24]Shalom N. Rosenfeld, Ioana Rus, Michel Cukier:
Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. COMPSAC (1) 2006: 178-188 - [c23]Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan:
A Statistical Analysis of Attack Data to Separate Attacks. DSN 2006: 383-392 - [c22]Robert Meyer, Michel Cukier:
Assessing the Attack Threat due to IRC Channels. DSN 2006: 467-472 - [c21]Michel Cukier, Ioana Rus:
Workshop on Empirical Evaluation of Dependability and Security (WEEDS). DSN 2006: 593 - 2005
- [c20]Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier:
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. DSN 2005: 602-611 - [c19]Matin Tamizi, Matt Weinstein, Michel Cukier:
Automated Checking for Windows Host Vulnerabilities. ISSRE 2005: 139-148 - 2004
- [j5]Ramesh Chandra, Ryan M. Lefever, Kaustubh R. Joshi, Michel Cukier, William H. Sanders:
A Global-State-Triggered Fault Injector for Distributed System Evaluation. IEEE Trans. Parallel Distributed Syst. 15(7): 593-605 (2004) - [c18]Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders:
Ferret: A Host Vulnerability Checking Tool. PRDC 2004: 389-394 - 2003
- [j4]Jennifer Ren, David E. Bakken, Tod Courtney, Michel Cukier, David A. Karr, Paul Rubel, Chetan Sabnis, William H. Sanders, Richard E. Schantz, Mouna Seri:
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. IEEE Trans. Computers 52(1): 31-50 (2003) - [j3]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
An Adaptive Quality of Service Aware Middleware for Replicated Services. IEEE Trans. Parallel Distributed Syst. 14(11): 1112-1125 (2003) - [c17]Sankalp Singh, Michel Cukier, William H. Sanders:
Probabilistic Validation of an Intrusion-Tolerant Replication System. DSN 2003: 615-624 - [c16]Ryan M. Lefever, Michel Cukier, William H. Sanders:
An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System. SRDS 2003: 273-282 - 2002
- [c15]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
An Adaptive Framework for Tunable Consistency and Timeliness Using Replication. DSN 2002: 17-26 - [c14]HariGovind V. Ramasamy, Prashant Pandey, James Lyons, Michel Cukier, William H. Sanders:
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. DSN 2002: 229-238 - [c13]Kaustubh R. Joshi, Michel Cukier, William H. Sanders:
Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. EDCC 2002: 140-158 - [c12]HariGovind V. Ramasamy, Michel Cukier, William H. Sanders:
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. PRDC 2002: 9-18 - [c11]Jennifer Ren, Paul Rubel, Mouna Seri, Michel Cukier, William H. Sanders, Tod Courtney:
Passive Replication Schemes in Aqua. PRDC 2002: 125-130 - [c10]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
Performance Evaluation of a Probabilistic Replica Selection Algorithm. WORDS 2002: 119-130 - 2001
- [j2]Jennifer Ren, Michel Cukier, William H. Sanders:
An Adaptive Algorithm for Tolerating Value Faults and Crash Failures. IEEE Trans. Parallel Distributed Syst. 12(2): 173-192 (2001) - [c9]Sudha Krishnamurthy, William H. Sanders, Michel Cukier:
A Dynamic Replica Selection Algorithm for Tolerating Timing Faults. DSN 2001: 107-116 - 2000
- [c8]Ramesh Chandra, Ryan M. Lefever, Michel Cukier, William H. Sanders:
Loki: A State-Driven Fault Injector for Distributed Systems. DSN 2000: 237-242 - [c7]Ramesh Chandra, Michel Cukier, Ryan M. Lefever, William H. Sanders:
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector. SRDS 2000: 248-257
1990 – 1999
- 1999
- [j1]Michel Cukier, David Powell, Jean Arlat:
Coverage Estimation Methods for Stratified Fault Injection. IEEE Trans. Computers 48(7): 707-723 (1999) - [c6]Jennifer Ren, Michel Cukier, Paul Rubel, William H. Sanders, David E. Bakken, David A. Karr:
Building Dependable Distributed Applications Using AQUA. HASE 1999: 189-196 - [c5]Michel Cukier, Ramesh Chandra, David Henke, Jessica Pistole, William H. Sanders:
Fault Injection based on a Partial View of the Global State of a Distributed System. SRDS 1999: 168-177 - 1998
- [c4]Michel Cukier, Jennifer Ren, Chetan Sabnis, David Henke, Jessica Pistole, William H. Sanders, David E. Bakken, Mark E. Berman, David A. Karr, Richard E. Schantz:
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. SRDS 1998: 245-253 - 1997
- [c3]Harpreet S. Duggal, Michel Cukier, William H. Sanders:
Probabilistic Verification of a Synchronous Round-Based Consensus Protocol. SRDS 1997: 165-174 - 1996
- [c2]David Powell, Michel Cukier, Jean Arlat:
On Stratified Sampling for High Coverage Estimations. EDCC 1996: 37-54 - 1994
- [c1]Mohamed Kaâniche, Karama Kanoun, Michel Cukier, Marta Rettelbusch de Bastos Martini:
Software Reliability Analysis of Three Successive Generations of a Switching System. EDCC 1994: 473-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint