Login / Signup
SIW@CCS
2014
2014
2014
Keyphrases
Publications
2014
Mingyi Zhao
,
Jens Grossklags
,
Kai Chen
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
SIW@CCS
(2014)
Heather Richter Lipford
,
Tyler Thomas
,
Bill Chu
,
Emerson R. Murphy-Hill
Interactive Code Annotation for Security Vulnerability Detection.
SIW@CCS
(2014)
Tiffany Brooke Jordan
,
Brittany Johnson
,
Jim Witschey
,
Emerson R. Murphy-Hill
Designing Interventions to Persuade Software Developers to Adopt Security Tools.
SIW@CCS
(2014)
Sathya Chandran Sundaramurthy
,
Jacob Case
,
Tony Truong
,
Loai Zomlot
,
Marcel Hoffmann
A Tale of Three Security Operation Centers.
SIW@CCS
(2014)
Erik E. Northrop
,
Heather Richter Lipford
Exploring the Usability of Open Source Network Forensic Tools.
SIW@CCS
(2014)
Celeste Lyn Paul
Human-Centered Study of a Network Operations Center: Experience Report and Lessons Learned.
SIW@CCS
(2014)
Radu Vanciu
,
Ebrahim Khalaj
,
Marwan Abi-Antoun
Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security Vulnerabilities.
SIW@CCS
(2014)
Jeff Wilson
,
Judith M. Brown
,
Robert Biddle
ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis.
SIW@CCS
(2014)
Proceedings of the 2014 ACM Workshop on Security Information Workers, SIW '14, Scottsdale, Arizona, USA, November 7, 2014
SIW@CCS
(2014)
Jim Witschey
,
Shundan Xiao
,
Emerson R. Murphy-Hill
Technical and Personal Factors Influencing Developers' Adoption of Security Tools.
SIW@CCS
(2014)