Seguir
Christopher Gates
Christopher Gates
Dirección de correo verificada de symantec.com
Título
Citado por
Citado por
Año
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5482012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4562012
A probabilistic discriminative model for android malware detection with decompiled source code
L Cen, CS Gates, L Si, N Li
IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014
1762014
Effective risk communication for android apps
CS Gates, J Chen, N Li, RW Proctor
IEEE Transactions on dependable and secure computing 11 (3), 252-265, 2013
852013
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
702014
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the seventh ACM on conference on data and application …, 2017
692017
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
682017
Continuous fiber composite reinforced synthetic wood elements
A Branca
US Patent App. 10/242,187, 2004
642004
Reagents for oligonucleotide cleavage and deprotection
JS Nelson
US Patent 6,664,388, 2003
53*2003
Influence of risk/safety information framing on android app-installation decisions
J Chen, CS Gates, N Li, RW Proctor
Journal of Cognitive Engineering and Decision Making 9 (2), 149-168, 2015
482015
Dimensions of risk in mobile applications: A user study
Z Jorgensen, J Chen, CS Gates, N Li, RW Proctor, T Yu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
382015
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
322019
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
322018
Detecting insider information theft using features from file access logs
C Gates, N Li, Z Xu, SN Chari, I Molloy, Y Park
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
312014
Systems and methods for categorizing security incidents
M Dell'Amico, C Gates, M Hart, K Roundy
US Patent 10,341,377, 2019
192019
CodeShield: Towards personalized application whitelisting
C Gates, N Li, J Chen, R Proctor
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
192012
Systems and methods for detecting security blind spots
C Gates, S Miskovic, M Hart, K Roundy
US Patent 10,091,231, 2018
132018
Learning from others: User anomaly detection using anomalous samples from other users
Y Park, IM Molloy, SN Chari, Z Xu, C Gates, N Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
132015
Framework for domain-independent archetype modeling
D Oglesby, K Schloegel, D Bhatt, E Engstrom
US Patent App. 10/242,201, 2003
132003
Automatic application identification from billions of files
K Soska, C Gates, KA Roundy, N Christin
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
122017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20