The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michel Cukier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shalom N. Rosenfeld, Ioana Rus, Michel Cukier
    Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:178-188 [Conf]
  2. Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan
    A Statistical Analysis of Attack Data to Separate Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:383-392 [Conf]
  3. Michel Cukier, Ioana Rus
    Workshop on Empirical Evaluation of Dependability and Security (WEEDS). [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:593- [Conf]
  4. Ramesh Chandra, Ryan M. Lefever, Michel Cukier, William H. Sanders
    Loki: A State-Driven Fault Injector for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:237-242 [Conf]
  5. Sudha Krishnamurthy, William H. Sanders, Michel Cukier
    A Dynamic Replica Selection Algorithm for Tolerating Timing Faults. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:107-116 [Conf]
  6. Sudha Krishnamurthy, William H. Sanders, Michel Cukier
    An Adaptive Framework for Tunable Consistency and Timeliness Using Replication. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:17-26 [Conf]
  7. Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier
    An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:602-611 [Conf]
  8. HariGovind V. Ramasamy, Prashant Pandey, James Lyons, Michel Cukier, William H. Sanders
    Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:229-238 [Conf]
  9. Robert Meyer, Michel Cukier
    Assessing the Attack Threat due to IRC Channels. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:467-472 [Conf]
  10. Sankalp Singh, Michel Cukier, William H. Sanders
    Probabilistic Validation of an Intrusion-Tolerant Replication System. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:615-624 [Conf]
  11. David Powell, Michel Cukier, Jean Arlat
    On Stratified Sampling for High Coverage Estimations. [Citation Graph (0, 0)][DBLP]
    EDCC, 1996, pp:37-54 [Conf]
  12. Kaustubh R. Joshi, Michel Cukier, William H. Sanders
    Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. [Citation Graph (0, 0)][DBLP]
    EDCC, 2002, pp:140-158 [Conf]
  13. Mohamed Kaâniche, Karama Kanoun, Michel Cukier, Marta Rettelbusch de Bastos Martini
    Software Reliability Analysis of Three Successive Generations of a Switching System. [Citation Graph (0, 0)][DBLP]
    EDCC, 1994, pp:473-490 [Conf]
  14. Jennifer Ren, Michel Cukier, Paul Rubel, William H. Sanders, David E. Bakken, David A. Karr
    Building Dependable Distributed Applications Using AQUA. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:189-196 [Conf]
  15. Matin Tamizi, Matt Weinstein, Michel Cukier
    Automated Checking for Windows Host Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2005, pp:139-148 [Conf]
  16. HariGovind V. Ramasamy, Michel Cukier, William H. Sanders
    Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. [Citation Graph (0, 0)][DBLP]
    PRDC, 2002, pp:9-18 [Conf]
  17. Jennifer Ren, Paul Rubel, Mouna Seri, Michel Cukier, William H. Sanders, Tod Courtney
    Passive Replication Schemes in Aqua. [Citation Graph (0, 0)][DBLP]
    PRDC, 2002, pp:125-130 [Conf]
  18. Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders
    Ferret: A Host Vulnerability Checking Tool. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:389-394 [Conf]
  19. Ramesh Chandra, Michel Cukier, Ryan M. Lefever, William H. Sanders
    Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector. [Citation Graph (0, 0)][DBLP]
    SRDS, 2000, pp:248-257 [Conf]
  20. Michel Cukier, Ramesh Chandra, David Henke, Jessica Pistole, William H. Sanders
    Fault Injection based on a Partial View of the Global State of a Distributed System. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:168-177 [Conf]
  21. Michel Cukier, Jennifer Ren, Chetan Sabnis, David Henke, Jessica Pistole, William H. Sanders, David E. Bakken, Mark E. Berman, David A. Karr, Richard E. Schantz
    AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:245-253 [Conf]
  22. Harpreet S. Duggal, Michel Cukier, William H. Sanders
    Probabilistic Verification of a Synchronous Round-Based Consensus Protocol. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1997, pp:165-174 [Conf]
  23. Ryan M. Lefever, Michel Cukier, William H. Sanders
    An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:273-282 [Conf]
  24. Sudha Krishnamurthy, William H. Sanders, Michel Cukier
    Performance Evaluation of a Probabilistic Replica Selection Algorithm. [Citation Graph (0, 0)][DBLP]
    WORDS, 2002, pp:119-130 [Conf]
  25. Partha Pratim Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar
    An architecture for adaptive intrusion-tolerant applications. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2006, v:36, n:11-12, pp:1331-1354 [Journal]
  26. Michel Cukier, David Powell, Jean Arlat
    Coverage Estimation Methods for Stratified Fault Injection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:7, pp:707-723 [Journal]
  27. Jennifer Ren, David E. Bakken, Tod Courtney, Michel Cukier, David A. Karr, Paul Rubel, Chetan Sabnis, William H. Sanders, Richard E. Schantz, Mouna Seri
    AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:1, pp:31-50 [Journal]
  28. Ramesh Chandra, Ryan M. Lefever, Kaustubh R. Joshi, Michel Cukier, William H. Sanders
    A Global-State-Triggered Fault Injector for Distributed System Evaluation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:7, pp:593-605 [Journal]
  29. Sudha Krishnamurthy, William H. Sanders, Michel Cukier
    An Adaptive Quality of Service Aware Middleware for Replicated Services. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:11, pp:1112-1125 [Journal]
  30. Jennifer Ren, Michel Cukier, William H. Sanders
    An Adaptive Algorithm for Tolerating Value Faults and Crash Failures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:2, pp:173-192 [Journal]
  31. Daniel Ramsbrock, Robin Berthier, Michel Cukier
    Profiling Attacker Behavior Following SSH Compromises. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:119-124 [Conf]
  32. Jesus Molina, Xavier Chorin, Michel Cukier
    Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:144-155 [Conf]
  33. Shalom N. Rosenfeld, Ioana Rus, Michel Cukier
    Archetypal behavior in computer security. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1594-1606 [Journal]

  34. Analyzing the process of installing rogue software. [Citation Graph (, )][DBLP]


  35. The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. [Citation Graph (, )][DBLP]


  36. On the Comparison of Network Attack Datasets: An Empirical Analysis. [Citation Graph (, )][DBLP]


  37. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. [Citation Graph (, )][DBLP]


  38. Analysis of Computer Security Incident Data Using Time Series Models. [Citation Graph (, )][DBLP]


  39. Applying Software Reliability Models on Security Incidents. [Citation Graph (, )][DBLP]


  40. A Comparison between Internal and External Malicious Traffic. [Citation Graph (, )][DBLP]


  41. Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. [Citation Graph (, )][DBLP]


  42. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002