Christopher Gates
Christopher Gates
Email verificata su
TitoloCitata daAnno
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent App. 10/242,187, 2019
A probabilistic discriminative model for android malware detection with decompiled source code
L Cen, CS Gates, L Si, N Li
IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014
Effective risk communication for android apps
CS Gates, J Chen, N Li, RW Proctor
IEEE Transactions on dependable and secure computing 11 (3), 252-265, 2013
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
Reagents for oligonucleotide cleavage and deprotection
JS Nelson
US Patent 6,664,388, 2003
Influence of risk/safety information framing on android app-installation decisions
J Chen, CS Gates, N Li, RW Proctor
Journal of Cognitive Engineering and Decision Making 9 (2), 149-168, 2015
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
Dimensions of risk in mobile applications: A user study
Z Jorgensen, J Chen, CS Gates, N Li, RW Proctor, T Yu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Detecting insider information theft using features from file access logs
C Gates, N Li, Z Xu, SN Chari, I Molloy, Y Park
European Symposium on Research in Computer Security, 383-400, 2014
Systems and methods for predicting security incidents triggered by security software
ST Chen, C Gates, HAN Yufei, M Hart, K Roundy
US Patent App. 10/242,201, 2019
Towards analyzing complex operating system access control configurations
H Chen, N Li, CS Gates, Z Mao
Proceedings of the 15th ACM symposium on Access control models and …, 2010
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
CodeShield: towards personalized application whitelisting
C Gates, N Li, J Chen, R Proctor
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Framing of summary risk/safety information and app selection
J Chen, CS Gates, RW Proctor, N Li
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 58 (1 …, 2014
Learning from others: User anomaly detection using anomalous samples from other users
Y Park, IM Molloy, SN Chari, Z Xu, C Gates, N Li
European Symposium on Research in Computer Security, 396-414, 2015
Estimating asset sensitivity by profiling users
Y Park, C Gates, SC Gates
European Symposium on Research in Computer Security, 94-110, 2013
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing {PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th {USENIX} Security Symposium ({USENIX} Security 18), 851-868, 2018
Predicting Cyber Threats with Virtual Security Products
ST Chen, Y Han, DH Chau, C Gates, M Hart, KA Roundy
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20