Rock Stevens
Rock Stevens
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
Hackers vs. testers: A comparison of software vulnerability discovery processes
D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018
602018
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
362017
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
202018
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
https://arxiv.org/abs/1701.04739, 2017
132017
A comprehensive quality evaluation of security and privacy advice on the web
EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 89-108, 2020
92020
Compliance cautions: Investigating security issues associated with us digital-security standards
R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ...
Proc. Network and Distributed System Security Symp, 2020
42020
Comparing and developing tools to measure the readability of domain-specific texts
E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
42019
First steps toward measuring the readability of security advice
EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ...
42018
Offensive Digital Countermeasures: Exploring the Implications for Governments
R Stevens, J Biller
The Cyber Defense Review 3 (3), 93-114, 2018
32018
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
R Stevens, J Dykstra, WK Everette, M Mazurek
IEEE Security & Privacy, 2020
22020
Applied Digital Threat Modeling: It Works
R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek
IEEE Security & Privacy 17 (4), 35-42, 2019
22019
Calcifying Crisis Readiness
R Stevens
22017
How to Hack Compliance: Using Lessons Learned to Repeatably Audit Compliance Programs for Digital Security Concerns
R Stevens, J Dykstra, W Knox-Everette, ML Mazurek
Learning from Authoritative Security Experiment Results (LASER), 2020
12020
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems
R Stevens
2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017
12017
14 Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
CM Ahmed, J Zhou, R Padilha, CM Rodrigues, F Andaló, G Bertocco, ...
2020
Optimizing Proactive Measures for Security Operations
R Stevens
2020
Digital Words: Moving Forward with Measuring the Readability of Online Texts
EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
2018
Army Vulnerability Response Program: A Critical Need in the Defense of our Nation
R Stevens, M Weigand
Cyber Defense Review, 2015
2015
Physical Security Threat from Hotel Wi-Fi
R Stevens, A Blum
2600 Magazine: The Hacker Quarterly, 2012
2012
FLIP Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline™ Hardware Implementation
S Mosley, M Potasznik, K Davis, R Stevens, M Ballmann, B Ancheta, ...
2007
The system can't perform the operation now. Try again later.
Articles 1–20