Bertrand Sobesto
Bertrand Sobesto
Senior IT Security Engineer, University of Maryland
Bestätigte E-Mail-Adresse bei umd.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Restrictive deterrent effects of a warning banner in an attacked computer system
D Maimon, M Alper, B Sobesto, M Cukier
Criminology 52 (1), 33-59, 2014
942014
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective
D Maimon, A Kamerdze, M Cukier, B Sobesto
British Journal of Criminology 53 (2), 319-343, 2013
502013
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace
T Wilson, D Maimon, B Sobesto, M Cukier
Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015
422015
Characterizing attackers and attacks: An empirical study
G Salles-Loustau, R Berthier, E Collange, B Sobesto, M Cukier
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011
292011
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors
A Testa, D Maimon, B Sobesto, M Cukier
Criminology & Public Policy 16 (3), 689-726, 2017
232017
Does malware detection improve with diverse antivirus products? An empirical study
I Gashi, B Sobesto, V Stankovic, M Cukier
International Conference on Computer Safety, Reliability, and Security, 94-105, 2013
142013
A study of the relationship between antivirus regressions and label changes
I Gashi, B Sobesto, S Mason, V Stankovic, M Cukier
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
132013
A practical experience on evaluating intrusion prevention system event data as indicators of security issues
RS Miani, BB Zarpelao, B Sobesto, M Cukier
2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 296-305, 2015
82015
DarkNOC: Dashboard for Honeypot Management.
B Sobesto, M Cukier, MA Hiltunen, D Kormann, G Vesonder, R Berthier
LISA, 2011
72011
Comparing detection capabilities of antivirus products: an empirical study with different versions of products from the same vendors
A Algaith, I Gashi, B Sobesto, M Cukier, S Haxhijaha, G Bajrami
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
62016
Predictably Deterrable? The case of system trespassers
D Maimon, A Testa, B Sobesto, M Cukier, W Ren
International conference on security, privacy and anonymity in computation …, 2019
42019
Empirical studies based on honeypots for characterizing attackers behavior
B Sobesto
22015
Network defense strategy based on cyber attack behavior prediction
W REN, C ZHAO, G JIANG, M David, W Theodore, S Bertrand
Journal of ZheJiang University (Engineering Science) 48 (12), 2144-2151, 2014
22014
Are computer focused crimes impacted by system configurations? an empirical study
B Sobesto, M Cukier, D Maimon
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
22012
Diversity with AntiVirus products: Additional empirical studies
I Gashi, V Stankovic, M Cukier, B Sobesto
12012
Technical report: Does Malware Detection Improve with Diverse Antivirus Products? An Empirical Study
M Cukier, I Gashi, B Sobesto, V Stankovic
2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–16