Follow
Michel Cukier
Michel Cukier
Associate Professor, University of Maryland
Verified email at umd.edu
Title
Cited by
Cited by
Year
Correlating human traits and cyber security behavior intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
computers & security 73, 345-358, 2018
3352018
AQuA: An adaptive architecture that provides dependable distributed objects
M Cukier, J Ren, C Sabnis, D Henke, J Pistole, WH Sanders, DE Bakken, ...
Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat …, 1998
2891998
Nfsight: netflow-based network awareness tool
R Berthier, M Cukier, M Hiltunen, D Kormann, G Vesonder, D Sheleheda
1642010
An experimental evaluation to determine if port scans are precursors to an attack
S Panjwani, S Tan, KM Jarrin, M Cukier
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
1572005
Restrictive deterrent effects of a warning banner in an attacked computer system
D Maimon, M Alper, B Sobesto, M Cukier
Criminology 52 (1), 33-59, 2014
1542014
Profiling attacker behavior following SSH compromises
D Ramsbrock, R Berthier, M Cukier
37th Annual IEEE/IFIP international conference on dependable systems and …, 2007
1522007
Probabilistic validation of an intrusion-tolerant replication system
S Singh, M Cukier, WH Sanders
DSN, 615-624, 2003
982003
AQuA: An adaptive architecture that provides dependable distributed objects
Y Ren, DE Bakken, T Courtney, M Cukier, DA Karr, P Rubel, C Sabnis, ...
IEEE Transactions on Computers 52 (1), 31-50, 2003
972003
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective
D Maimon, A Kamerdze, M Cukier, B Sobesto
British Journal of Criminology 53 (2), 319-343, 2013
832013
Assessing the attack threat due to IRC channels
R Meyer, M Cukier
International Conference on Dependable Systems and Networks (DSN'06), 467-472, 2006
822006
Coverage estimation methods for stratified fault-injection
M Cukier, D Powell, J Ariat
IEEE Transactions on Computers 48 (7), 707-723, 1999
751999
Risk and the five hard problems of cybersecurity
NM Scala, AC Reilly, PL Goethals, M Cukier
Risk Analysis 39 (10), 2119-2126, 2019
712019
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace
T Wilson, D Maimon, B Sobesto, M Cukier
Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015
692015
Quantifying the cost of providing intrusion tolerance in group communication systems
HGV Ramasamy, P Pandey, J Lyons, M Cukier, WH Sanders
Proceedings International Conference on Dependable Systems and Networks, 229-238, 2002
692002
A global-state-triggered fault injector for distributed system evaluation
R Chandra, RM Lefever, KR Joshi, M Cukier, WH Sanders
IEEE Transactions on Parallel and Distributed Systems 15 (7), 593-605, 2004
662004
Loki: A state-driven fault injector for distributed systems
R Chandra, RM Lefever, M Cukier, WH Sanders
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
642000
Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games
M Coenraad, A Pellicone, DJ Ketelhut, M Cukier, J Plane, D Weintrop
Simulation & Gaming 51 (5), 586-611, 2020
632020
An adaptive quality of service aware middleware for replicated services
S Krishnamurthy, WH Sanders, M Cukier
IEEE Transactions on Parallel and Distributed Systems 14 (11), 1112-1125, 2003
582003
Process mining and hierarchical clustering to help intrusion alert visualization
SC De Alvarenga, S Barbon Jr, RS Miani, M Cukier, BB Zarpelão
Computers & Security 73, 474-491, 2018
562018
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors
A Testa, D Maimon, B Sobesto, M Cukier
Criminology & Public Policy 16 (3), 689-726, 2017
552017
The system can't perform the operation now. Try again later.
Articles 1–20