| 2008 |
| 39 | EE | Robin Berthier,
Dave Korman,
Michel Cukier,
Matti A. Hiltunen,
Gregg Vesonder,
Daniel Sheleheda:
On the Comparison of Network Attack Datasets: An Empirical Analysis.
HASE 2008: 39-48 |
| 38 | EE | Danielle Chrun,
Michel Cukier,
Gerry Sneeringer:
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis.
HASE 2008: 49-58 |
| 37 | EE | Robin Berthier,
Michel Cukier:
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis.
HASE 2008: 59-68 |
| 36 | EE | Edward Condon,
Angela He,
Michel Cukier:
Analysis of Computer Security Incident Data Using Time Series Models.
ISSRE 2008: 77-86 |
| 35 | EE | Danielle Chrun,
Michel Cukier,
Gerry Sneeringer:
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data.
SAFECOMP 2008: 221-234 |
| 34 | EE | HariGovind V. Ramasamy,
Prashant Pandey,
Michel Cukier,
William H. Sanders:
Experiences with building an intrusion-tolerant group communication system.
Softw., Pract. Exper. 38(6): 639-666 (2008) |
| 2007 |
| 33 | EE | Daniel Ramsbrock,
Robin Berthier,
Michel Cukier:
Profiling Attacker Behavior Following SSH Compromises.
DSN 2007: 119-124 |
| 32 | EE | Jesus Molina,
Xavier Chorin,
Michel Cukier:
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences.
ICISC 2007: 144-155 |
| 31 | EE | Shalom N. Rosenfeld,
Ioana Rus,
Michel Cukier:
Archetypal behavior in computer security.
Journal of Systems and Software 80(10): 1594-1606 (2007) |
| 2006 |
| 30 | EE | Shalom N. Rosenfeld,
Ioana Rus,
Michel Cukier:
Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security.
COMPSAC (1) 2006: 178-188 |
| 29 | EE | Michel Cukier,
Robin Berthier,
Susmit Panjwani,
Stephanie Tan:
A Statistical Analysis of Attack Data to Separate Attacks.
DSN 2006: 383-392 |
| 28 | EE | Robert Meyer,
Michel Cukier:
Assessing the Attack Threat due to IRC Channels.
DSN 2006: 467-472 |
| 27 | EE | Michel Cukier,
Ioana Rus:
Workshop on Empirical Evaluation of Dependability and Security (WEEDS).
DSN 2006: 593 |
| 26 | EE | Partha Pratim Pal,
Paul Rubel,
Michael Atighetchi,
Franklin Webber,
William H. Sanders,
Mouna Seri,
HariGovind V. Ramasamy,
James Lyons,
Tod Courtney,
Adnan Agbaria,
Michel Cukier,
Jeanna M. Gossett,
Idit Keidar:
An architecture for adaptive intrusion-tolerant applications.
Softw., Pract. Exper. 36(11-12): 1331-1354 (2006) |
| 2005 |
| 25 | EE | Susmit Panjwani,
Stephanie Tan,
Keith M. Jarrin,
Michel Cukier:
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack.
DSN 2005: 602-611 |
| 24 | EE | Matin Tamizi,
Matt Weinstein,
Michel Cukier:
Automated Checking for Windows Host Vulnerabilities.
ISSRE 2005: 139-148 |
| 2004 |
| 23 | EE | Anil Sharma,
Jason R. Martin,
Nitin Anand,
Michel Cukier,
William H. Sanders:
Ferret: A Host Vulnerability Checking Tool.
PRDC 2004: 389-394 |
| 22 | EE | Ramesh Chandra,
Ryan M. Lefever,
Kaustubh R. Joshi,
Michel Cukier,
William H. Sanders:
A Global-State-Triggered Fault Injector for Distributed System Evaluation.
IEEE Trans. Parallel Distrib. Syst. 15(7): 593-605 (2004) |
| 2003 |
| 21 | EE | Sankalp Singh,
Michel Cukier,
William H. Sanders:
Probabilistic Validation of an Intrusion-Tolerant Replication System.
DSN 2003: 615-624 |
| 20 | EE | Ryan M. Lefever,
Michel Cukier,
William H. Sanders:
An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System.
SRDS 2003: 273-282 |
| 19 | EE | Jennifer Ren,
David E. Bakken,
Tod Courtney,
Michel Cukier,
David A. Karr,
Paul Rubel,
Chetan Sabnis,
William H. Sanders,
Richard E. Schantz,
Mouna Seri:
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
IEEE Trans. Computers 52(1): 31-50 (2003) |
| 18 | EE | Sudha Krishnamurthy,
William H. Sanders,
Michel Cukier:
An Adaptive Quality of Service Aware Middleware for Replicated Services.
IEEE Trans. Parallel Distrib. Syst. 14(11): 1112-1125 (2003) |
| 2002 |
| 17 | EE | Sudha Krishnamurthy,
William H. Sanders,
Michel Cukier:
An Adaptive Framework for Tunable Consistency and Timeliness Using Replication.
DSN 2002: 17-26 |
| 16 | EE | HariGovind V. Ramasamy,
Prashant Pandey,
James Lyons,
Michel Cukier,
William H. Sanders:
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems.
DSN 2002: 229-238 |
| 15 | EE | Kaustubh R. Joshi,
Michel Cukier,
William H. Sanders:
Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol.
EDCC 2002: 140-158 |
| 14 | EE | Jennifer Ren,
Paul Rubel,
Mouna Seri,
Michel Cukier,
William H. Sanders,
Tod Courtney:
Passive Replication Schemes in Aqua.
PRDC 2002: 125-130 |
| 13 | EE | HariGovind V. Ramasamy,
Michel Cukier,
William H. Sanders:
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
PRDC 2002: 9-18 |
| 12 | EE | Sudha Krishnamurthy,
William H. Sanders,
Michel Cukier:
Performance Evaluation of a Probabilistic Replica Selection Algorithm.
WORDS 2002: 119-130 |
| 2001 |
| 11 | EE | Sudha Krishnamurthy,
William H. Sanders,
Michel Cukier:
A Dynamic Replica Selection Algorithm for Tolerating Timing Faults.
DSN 2001: 107-116 |
| 10 | EE | Jennifer Ren,
Michel Cukier,
William H. Sanders:
An Adaptive Algorithm for Tolerating Value Faults and Crash Failures.
IEEE Trans. Parallel Distrib. Syst. 12(2): 173-192 (2001) |
| 2000 |
| 9 | EE | Ramesh Chandra,
Ryan M. Lefever,
Michel Cukier,
William H. Sanders:
Loki: A State-Driven Fault Injector for Distributed Systems.
DSN 2000: 237-242 |
| 8 | EE | Ramesh Chandra,
Michel Cukier,
Ryan M. Lefever,
William H. Sanders:
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector.
SRDS 2000: 248-257 |
| 1999 |
| 7 | EE | Jennifer Ren,
Michel Cukier,
Paul Rubel,
William H. Sanders,
David E. Bakken,
David A. Karr:
Building Dependable Distributed Applications Using AQUA.
HASE 1999: 189-196 |
| 6 | EE | Michel Cukier,
Ramesh Chandra,
David Henke,
Jessica Pistole,
William H. Sanders:
Fault Injection based on a Partial View of the Global State of a Distributed System.
SRDS 1999: 168-177 |
| 5 | | Michel Cukier,
David Powell,
Jean Arlat:
Coverage Estimation Methods for Stratified Fault Injection.
IEEE Trans. Computers 48(7): 707-723 (1999) |
| 1998 |
| 4 | | Michel Cukier,
Jennifer Ren,
Chetan Sabnis,
David Henke,
Jessica Pistole,
William H. Sanders,
David E. Bakken,
Mark E. Berman,
David A. Karr,
Richard E. Schantz:
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
SRDS 1998: 245-253 |
| 1997 |
| 3 | | Harpreet S. Duggal,
Michel Cukier,
William H. Sanders:
Probabilistic Verification of a Synchronous Round-Based Consensus Protocol.
SRDS 1997: 165-174 |
| 1996 |
| 2 | | David Powell,
Michel Cukier,
Jean Arlat:
On Stratified Sampling for High Coverage Estimations.
EDCC 1996: 37-54 |
| 1994 |
| 1 | | Mohamed Kaâniche,
Karama Kanoun,
Michel Cukier,
Marta Rettelbusch de Bastos Martini:
Software Reliability Analysis of Three Successive Generations of a Switching System.
EDCC 1994: 473-490 |