Rock Stevens
Rock Stevens
Verified email at - Homepage
Cited by
Cited by
Hackers vs. testers: A comparison of software vulnerability discovery processes
D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek
2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018
A comprehensive quality evaluation of security and privacy advice on the web
EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ...
29th USENIX Security Symposium (USENIX Security 20), 89-108, 2020
Trust: The Key to Leading When Lives Are on the Line
P Sweeney, K Dirks, D Sundberg, P Lester, R Stevens
Leadership in dangerous situations: A handbook for the armed forces …, 2022
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş, 2017
Compliance Cautions: Investigating Security Issues Associated with US Digital-Security Standards.
R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ...
NDSS, 2020
First steps toward measuring the readability of security advice
EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ...
The 2018 IEEE Security & Privacy Workshop on Technology and Consumer …, 2018
Comparing and developing tools to measure the readability of domain-specific texts
E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
Applied digital threat modeling: It works
R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek
IEEE Security & Privacy 17 (4), 35-42, 2019
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
R Stevens, J Dykstra, WK Everette, M Mazurek
IEEE Security & Privacy, 2020
Offensive Digital Countermeasures: Exploring the Implications for Governments
R Stevens, J Biller
The Cyber Defense Review 3 (3), 93-114, 2018
Calcifying crisis readiness
R Stevens
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems
R Stevens
2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates
R Stevens, FB Kokulu, A Doupé, ML Mazurek
Network and Distributed System Security (NDSS) Symposium, 2022
How to Hack Compliance: Using Lessons Learned to Repeatably Audit Compliance Programs for Digital Security Concerns
R Stevens, J Dykstra, W Knox-Everette, ML Mazurek
Learning from Authoritative Security Experiment Results (LASER), 2020
Optimizing Proactive Measures for Security Operations
RA Stevens
University of Maryland, College Park, 2020
Digital Words: Moving Forward with Measuring the Readability of Online Texts
EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ...
FLIP-Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline Hardware Implementation.
S Mosley, M Potasznik, K Davis, R Stevens, M Ballmann, B Ancheta, ...
ICWN, 167-173, 2007
The system can't perform the operation now. Try again later.
Articles 1–20