That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers S Oesch, S Ruoti Proceedings of the 29th USENIX Conference on Security Symposium, 2165-2182, 2020 | 62 | 2020 |
“It Basically Started Using Me:” An Observational Study of Password Manager Usage S Oesch, S Ruoti, J Simmons, A Gautam Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 16 | 2022 |
Systematization of password manageruse cases and design paradigms J Simmons, O Diallo, S Oesch, S Ruoti Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 12 | 2021 |
The emperor’s new autofill framework: a security analysis of autofill on iOS and Android S Oesch, A Gautam, S Ruoti Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 9 | 2021 |
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ... arXiv preprint arXiv:2012.09214, 2020 | 8 | 2020 |
An assessment of the usability of machine learning based tools for the security operations center S Oesch, R Bridges, J Smith, J Beaver, J Goodall, K Huffer, C Miles, ... 2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020 | 8 | 2020 |
Testing SOAR tools in use RA Bridges, AE Rice, S Oesch, JA Nichols, C Watson, K Spakes, S Norem, ... Computers & Security 129, 103201, 2023 | 7 | 2023 |
Understanding user perceptions of security and privacy for group chat: a survey of users in the US and UK S Oesch, R Abu-Salma, O Diallo, J Krämer, J Simmons, J Wu, S Ruoti Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 7 | 2020 |
Toward the detection of polyglot files L Koch, S Oesch, A Chaulagain, M Adkisson, S Erwin, B Weber Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022 | 5 | 2022 |
D2U: Data driven user emulation for the enhancement of cyber testing, training, and data set generation S Oesch, RA Bridges, M Verma, B Weber, O Diallo Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 17-26, 2021 | 5 | 2021 |
Nation scale mobile ad hoc network for normally isolated topologies S Oesch, M Schuchard 2019 international conference on internet of things (iThings) and IEEE green …, 2019 | 5 | 2019 |
User perceptions of security and privacy for group chat S Oesch, R Abu-Salma, O Diallo, J Krämer, J Simmons, J Wu, S Ruoti Digital Threats: Research and Practice (DTRAP) 3 (2), 1-29, 2022 | 4 | 2022 |
A mathematical framework for evaluation of SOAR tools with limited survey data S Norem, AE Rice, S Erwin, RA Bridges, S Oesch, B Weber European Symposium on Research in Computer Security, 557-575, 2021 | 4 | 2021 |
AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors RA Bridges, B Weber, JM Beaver, JM Smith, ME Verma, S Norem, ... 2023 IEEE International Conference on Big Data (BigData), 1620-1629, 2023 | 1 | 2023 |
Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware Detectors RA Bridges, S Oesch, MD Iannacone, KMT Huffer, B Jewell, JA Nichols, ... Digital Threats: Research and Practice 4 (2), 1-22, 2023 | 1 | 2023 |
What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity E Begoli, RA Bridges, S Oesch, KE Knight arXiv preprint arXiv:2105.06545, 2021 | 1 | 2021 |
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers S Oesch, S Ruoti arXiv preprint arXiv:1908.03296, 2019 | 1 | 2019 |
Reinforcement Learning-based Traffic Control to Optimize Energy Usage and Throughput (CRADA report) T Karnowski, M Eicholtz, W Elwasif, R Ferrell, T Naughton III, TS Oesch, ... Oak Ridge National Lab.(ORNL), Oak Ridge, TN (United States), 2019 | 1 | 2019 |
The Path To Autonomous Cyber Defense S Oesch, P Austria, A Chaulagain, B Weber, C Watson, M Dixson, ... arXiv preprint arXiv:2404.10788, 2024 | | 2024 |
Poster: Cognitive Cyber–Dynamic, Adaptive Cyber Defense Systems for Massively Distributed, Autonomous, and Ad-hoc Computing Environments E Begoli, E Meyer, P Moriano, S Oesch Proceedings of the 17th ACM International Conference on Distributed and …, 2023 | | 2023 |