Hackers vs. testers: A comparison of software vulnerability discovery processes D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek 2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018 | 202 | 2018 |
A comprehensive quality evaluation of security and privacy advice on the web EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ... 29th USENIX Security Symposium (USENIX Security 20), 89-108, 2020 | 149 | 2020 |
Trust: The Key to Leading When Lives Are on the Line P Sweeney, K Dirks, D Sundberg, P Lester, R Stevens Leadership in dangerous situations: A handbook for the armed forces …, 2022 | 91* | 2022 |
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek 27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018 | 62 | 2018 |
User interactions and permission use on android K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 62 | 2017 |
Compliance Cautions: Investigating Security Issues Associated with US Digital-Security Standards. R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ... NDSS, 2020 | 28 | 2020 |
How ready is your ready? assessing the usability of incident response playbook frameworks R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ... Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 23 | 2022 |
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş https://arxiv.org/abs/1701.04739, 2017 | 22 | 2017 |
Comparing and developing tools to measure the readability of domain-specific texts E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ... Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019 | 16 | 2019 |
First steps toward measuring the readability of security advice EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ... The 2018 IEEE Security & Privacy Workshop on Technology and Consumer …, 2018 | 14 | 2018 |
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs R Stevens, J Dykstra, WK Everette, M Mazurek IEEE Security & Privacy, 2020 | 9 | 2020 |
Applied digital threat modeling: It works R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek IEEE Security & Privacy 17 (4), 35-42, 2019 | 7 | 2019 |
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates R Stevens, FB Kokulu, A Doupé, ML Mazurek Network and Distributed System Security (NDSS) Symposium, 2022 | 6 | 2022 |
Offensive Digital Countermeasures: Exploring the Implications for Governments R Stevens, J Biller The Cyber Defense Review 3 (3), 93-114, 2018 | 5 | 2018 |
Calcifying crisis readiness R Stevens | 5 | 2017 |
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems R Stevens 2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017 | 2 | 2017 |
Optimizing Proactive Measures for Security Operations RA Stevens University of Maryland, College Park, 2020 | 1 | 2020 |
How to Hack Compliance: Using Lessons Learned to Repeatably Audit Compliance Programs for Digital Security Concerns R Stevens, J Dykstra, W Knox-Everette, ML Mazurek Learning from Authoritative Security Experiment Results (LASER), 2020 | 1 | 2020 |
Digital Words: Moving Forward with Measuring the Readability of Online Texts EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ... | | 2018 |
FLIP-Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline Hardware Implementation. S Mosley, M Potasznik, K Davis, R Stevens, M Ballmann, B Ancheta, ... ICWN, 167-173, 2007 | | 2007 |