default search action
SIW@CCS 2014: Scottsdale, Arizona, USA
- Robert Biddle, Bill Chu, Emerson R. Murphy-Hill, Heather Richter Lipford:
Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3152-4
Tools
- Erik E. Northrop, Heather Richter Lipford:
Exploring the Usability of Open Source Network Forensic Tools. 1-8 - Jeff Wilson, Judith M. Brown, Robert Biddle:
ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis. 9-16 - Heather Richter Lipford, Tyler Thomas, Bill Chu, Emerson R. Murphy-Hill:
Interactive Code Annotation for Security Vulnerability Detection. 17-22
Software Development
- Jim Witschey, Shundan Xiao, Emerson R. Murphy-Hill:
Technical and Personal Factors Influencing Developers' Adoption of Security Tools. 23-26 - Radu Vanciu, Ebrahim Khalaj, Marwan Abi-Antoun:
Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security Vulnerabilities. 27-34 - Tiffany Brooke Jordan, Brittany Johnson, Jim Witschey, Emerson R. Murphy-Hill:
Designing Interventions to Persuade Software Developers to Adopt Security Tools. 35-38
Operations
- Celeste Lyn Paul:
Human-Centered Study of a Network Operations Center: Experience Report and Lessons Learned. 39-42 - Sathya Chandran Sundaramurthy, Jacob Case, Tony Truong, Loai Zomlot, Marcel Hoffmann:
A Tale of Three Security Operation Centers. 43-50 - Mingyi Zhao, Jens Grossklags, Kai Chen:
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program. 51-58
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.