|
Search the dblp DataBase
Michel Cukier:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shalom N. Rosenfeld, Ioana Rus, Michel Cukier
Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2006, pp:178-188 [Conf]
- Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan
A Statistical Analysis of Attack Data to Separate Attacks. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:383-392 [Conf]
- Michel Cukier, Ioana Rus
Workshop on Empirical Evaluation of Dependability and Security (WEEDS). [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:593- [Conf]
- Ramesh Chandra, Ryan M. Lefever, Michel Cukier, William H. Sanders
Loki: A State-Driven Fault Injector for Distributed Systems. [Citation Graph (0, 0)][DBLP] DSN, 2000, pp:237-242 [Conf]
- Sudha Krishnamurthy, William H. Sanders, Michel Cukier
A Dynamic Replica Selection Algorithm for Tolerating Timing Faults. [Citation Graph (0, 0)][DBLP] DSN, 2001, pp:107-116 [Conf]
- Sudha Krishnamurthy, William H. Sanders, Michel Cukier
An Adaptive Framework for Tunable Consistency and Timeliness Using Replication. [Citation Graph (0, 0)][DBLP] DSN, 2002, pp:17-26 [Conf]
- Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:602-611 [Conf]
- HariGovind V. Ramasamy, Prashant Pandey, James Lyons, Michel Cukier, William H. Sanders
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems. [Citation Graph (0, 0)][DBLP] DSN, 2002, pp:229-238 [Conf]
- Robert Meyer, Michel Cukier
Assessing the Attack Threat due to IRC Channels. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:467-472 [Conf]
- Sankalp Singh, Michel Cukier, William H. Sanders
Probabilistic Validation of an Intrusion-Tolerant Replication System. [Citation Graph (0, 0)][DBLP] DSN, 2003, pp:615-624 [Conf]
- David Powell, Michel Cukier, Jean Arlat
On Stratified Sampling for High Coverage Estimations. [Citation Graph (0, 0)][DBLP] EDCC, 1996, pp:37-54 [Conf]
- Kaustubh R. Joshi, Michel Cukier, William H. Sanders
Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. [Citation Graph (0, 0)][DBLP] EDCC, 2002, pp:140-158 [Conf]
- Mohamed Kaâniche, Karama Kanoun, Michel Cukier, Marta Rettelbusch de Bastos Martini
Software Reliability Analysis of Three Successive Generations of a Switching System. [Citation Graph (0, 0)][DBLP] EDCC, 1994, pp:473-490 [Conf]
- Jennifer Ren, Michel Cukier, Paul Rubel, William H. Sanders, David E. Bakken, David A. Karr
Building Dependable Distributed Applications Using AQUA. [Citation Graph (0, 0)][DBLP] HASE, 1999, pp:189-196 [Conf]
- Matin Tamizi, Matt Weinstein, Michel Cukier
Automated Checking for Windows Host Vulnerabilities. [Citation Graph (0, 0)][DBLP] ISSRE, 2005, pp:139-148 [Conf]
- HariGovind V. Ramasamy, Michel Cukier, William H. Sanders
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. [Citation Graph (0, 0)][DBLP] PRDC, 2002, pp:9-18 [Conf]
- Jennifer Ren, Paul Rubel, Mouna Seri, Michel Cukier, William H. Sanders, Tod Courtney
Passive Replication Schemes in Aqua. [Citation Graph (0, 0)][DBLP] PRDC, 2002, pp:125-130 [Conf]
- Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders
Ferret: A Host Vulnerability Checking Tool. [Citation Graph (0, 0)][DBLP] PRDC, 2004, pp:389-394 [Conf]
- Ramesh Chandra, Michel Cukier, Ryan M. Lefever, William H. Sanders
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector. [Citation Graph (0, 0)][DBLP] SRDS, 2000, pp:248-257 [Conf]
- Michel Cukier, Ramesh Chandra, David Henke, Jessica Pistole, William H. Sanders
Fault Injection based on a Partial View of the Global State of a Distributed System. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1999, pp:168-177 [Conf]
- Michel Cukier, Jennifer Ren, Chetan Sabnis, David Henke, Jessica Pistole, William H. Sanders, David E. Bakken, Mark E. Berman, David A. Karr, Richard E. Schantz
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1998, pp:245-253 [Conf]
- Harpreet S. Duggal, Michel Cukier, William H. Sanders
Probabilistic Verification of a Synchronous Round-Based Consensus Protocol. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1997, pp:165-174 [Conf]
- Ryan M. Lefever, Michel Cukier, William H. Sanders
An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System. [Citation Graph (0, 0)][DBLP] SRDS, 2003, pp:273-282 [Conf]
- Sudha Krishnamurthy, William H. Sanders, Michel Cukier
Performance Evaluation of a Probabilistic Replica Selection Algorithm. [Citation Graph (0, 0)][DBLP] WORDS, 2002, pp:119-130 [Conf]
- Partha Pratim Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar
An architecture for adaptive intrusion-tolerant applications. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2006, v:36, n:11-12, pp:1331-1354 [Journal]
- Michel Cukier, David Powell, Jean Arlat
Coverage Estimation Methods for Stratified Fault Injection. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1999, v:48, n:7, pp:707-723 [Journal]
- Jennifer Ren, David E. Bakken, Tod Courtney, Michel Cukier, David A. Karr, Paul Rubel, Chetan Sabnis, William H. Sanders, Richard E. Schantz, Mouna Seri
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:1, pp:31-50 [Journal]
- Ramesh Chandra, Ryan M. Lefever, Kaustubh R. Joshi, Michel Cukier, William H. Sanders
A Global-State-Triggered Fault Injector for Distributed System Evaluation. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:7, pp:593-605 [Journal]
- Sudha Krishnamurthy, William H. Sanders, Michel Cukier
An Adaptive Quality of Service Aware Middleware for Replicated Services. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:11, pp:1112-1125 [Journal]
- Jennifer Ren, Michel Cukier, William H. Sanders
An Adaptive Algorithm for Tolerating Value Faults and Crash Failures. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:2, pp:173-192 [Journal]
- Daniel Ramsbrock, Robin Berthier, Michel Cukier
Profiling Attacker Behavior Following SSH Compromises. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:119-124 [Conf]
- Jesus Molina, Xavier Chorin, Michel Cukier
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:144-155 [Conf]
- Shalom N. Rosenfeld, Ioana Rus, Michel Cukier
Archetypal behavior in computer security. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:10, pp:1594-1606 [Journal]
Analyzing the process of installing rogue software. [Citation Graph (, )][DBLP]
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. [Citation Graph (, )][DBLP]
On the Comparison of Network Attack Datasets: An Empirical Analysis. [Citation Graph (, )][DBLP]
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. [Citation Graph (, )][DBLP]
Analysis of Computer Security Incident Data Using Time Series Models. [Citation Graph (, )][DBLP]
Applying Software Reliability Models on Security Incidents. [Citation Graph (, )][DBLP]
A Comparison between Internal and External Malicious Traffic. [Citation Graph (, )][DBLP]
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. [Citation Graph (, )][DBLP]
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. [Citation Graph (, )][DBLP]
Search in 0.339secs, Finished in 0.342secs
|