Rock Stevens
Rock Stevens
Verified email at - Homepage
Cited by
Cited by
Hackers vs. testers: A comparison of software vulnerability discovery processes
D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş, 2017
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts
E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
Compliance cautions: Investigating security issues associated with us digital-security standards
R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ...
Proc. Network and Distributed System Security Symp, 2020
First Steps Toward Measuring the Readability of Security Advice
EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ...
Applied Digital Threat Modeling: It Works
R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek
IEEE Security & Privacy 17 (4), 35-42, 2019
Offensive Digital Countermeasures: Exploring the Implications for Governments
R Stevens, J Biller
The Cyber Defense Review 3 (3), 93-114, 2018
Calcifying Crisis Readiness
R Stevens
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
R Stevens, J Dykstra, WK Everette, M Mazurek
IEEE Security & Privacy, 2020
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 89-108, 2020
Digital Words: Moving Forward with Measuring the Readability of Online Texts
EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Spanning the Globe to Bring You the Collective Collection
K Armstrong
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems
R Stevens
2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017
Army Vulnerability Response Program: A Critical Need in the Defense of our Nation
R Stevens, M Weigand
Cyber Defense Review, 2015
Physical Security Threat from Hotel Wi-Fi
R Stevens, A Blum
2600 Magazine: The Hacker Quarterly, 2012
FLIP Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline™ Hardware Implementation
S Mosley, M Potasznik, K Davis, R Stevens, M Ballmann, B Ancheta, ...
Measuring Security Advice Quality: First Steps
EM Redmiles, E Hwang, D Kuchhal, E Liu, L Maszkiewicz, M Morales, ...
Wei Bai, University of Maryland, College Park Abhishek Bhowmick, UT Austin David Chisnall, University of Cambridge Chris Colby, Google
M Dalton, M Fyrbiak, LM González, K Heitala, C Herley, M Jakubowski, ...
The system can't perform the operation now. Try again later.
Articles 1–20