Follow
Rock Stevens
Rock Stevens
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
Hackers vs. testers: A comparison of software vulnerability discovery processes
D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018
1292018
A comprehensive quality evaluation of security and privacy advice on the web
EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ...
29th USENIX Security Symposium (USENIX Security 20), 89-108, 2020
672020
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
472017
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
412018
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
https://arxiv.org/abs/1701.04739, 2017
192017
Compliance Cautions: Investigating Security Issues Associated with US Digital-Security Standards.
R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ...
NDSS, 2020
132020
First steps toward measuring the readability of security advice
EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ...
The 2018 IEEE Security & Privacy Workshop on Technology and Consumer …, 2018
92018
Comparing and developing tools to measure the readability of domain-specific texts
E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
82019
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
R Stevens, J Dykstra, WK Everette, M Mazurek
IEEE Security & Privacy, 2020
52020
Applied digital threat modeling: It works
R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek
IEEE Security & Privacy 17 (4), 35-42, 2019
52019
Calcifying crisis readiness
R Stevens
52017
Offensive Digital Countermeasures: Exploring the Implications for Governments
R Stevens, J Biller
The Cyber Defense Review 3 (3), 93-114, 2018
42018
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
CHI Conference on Human Factors in Computing Systems, 1-18, 2022
32022
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems
R Stevens
2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017
22017
How to Hack Compliance: Using Lessons Learned to Repeatably Audit Compliance Programs for Digital Security Concerns
R Stevens, J Dykstra, W Knox-Everette, ML Mazurek
Learning from Authoritative Security Experiment Results (LASER), 2020
12020
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates
R Stevens, FB Kokulu, A Doupé, ML Mazurek
Network and Distributed System Security (NDSS) Symposium, 2022
2022
14 Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
CM Ahmed, J Zhou, R Padilha, CM Rodrigues, F Andaló, G Bertocco, ...
2020
Optimizing Proactive Measures for Security Operations
RA Stevens
University of Maryland, College Park, 2020
2020
Digital Words: Moving Forward with Measuring the Readability of Online Texts
EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
2018
Physical Security Threat from Hotel Wi-Fi
R Stevens, A Blum
2600 Magazine: The Hacker Quarterly, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20