BibTeX records: Christopher Gates 0002

download as .bib file

@inproceedings{DBLP:conf/chi/SharifRD0KBC19,
  author       = {Mahmood Sharif and
                  Kevin A. Roundy and
                  Matteo Dell'Amico and
                  Christopher Gates and
                  Daniel Kats and
                  Lujo Bauer and
                  Nicolas Christin},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support
                  Chats},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {78},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300308},
  doi          = {10.1145/3290605.3300308},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/SharifRD0KBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/HanM0RS19,
  author       = {Yufei Han and
                  Yuzhe Ma and
                  Christopher Gates and
                  Kevin A. Roundy and
                  Yun Shen},
  title        = {Collaborative and Privacy-Preserving Machine Teaching via Consensus
                  Optimization},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8851811},
  doi          = {10.1109/IJCNN.2019.8851811},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/HanM0RS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SimoiuB0G19,
  author       = {Camelia Simoiu and
                  Joseph Bonneau and
                  Christopher Gates and
                  Sharad Goel},
  editor       = {Heather Richter Lipford},
  title        = {"I was told to buy a software or lose my computer. {I} ignored
                  it": {A} study of ransomware},
  booktitle    = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019,
                  Santa Clara, CA, USA, August 11-13, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/soups2019/presentation/simoiu},
  timestamp    = {Mon, 01 Feb 2021 08:41:56 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/SimoiuB0G19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-02796,
  author       = {Yufei Han and
                  Yuzhe Ma and
                  Christopher Gates and
                  Kevin A. Roundy and
                  Yun Shen},
  title        = {Collaborative and Privacy-Preserving Machine Teaching via Consensus
                  Optimization},
  journal      = {CoRR},
  volume       = {abs/1905.02796},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.02796},
  eprinttype    = {arXiv},
  eprint       = {1905.02796},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-02796.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvcg/PientaHETRGNC18,
  author       = {Robert S. Pienta and
                  Fred Hohman and
                  Alex Endert and
                  Acar Tamersoy and
                  Kevin A. Roundy and
                  Christopher S. Gates and
                  Shamkant B. Navathe and
                  Duen Horng Chau},
  title        = {{VIGOR:} Interactive Visual Exploration of Graph Query Results},
  journal      = {{IEEE} Trans. Vis. Comput. Graph.},
  volume       = {24},
  number       = {1},
  pages        = {215--225},
  year         = {2018},
  url          = {https://doi.org/10.1109/TVCG.2017.2744898},
  doi          = {10.1109/TVCG.2017.2744898},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvcg/PientaHETRGNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KimKKGD18,
  author       = {Doowon Kim and
                  Bum Jun Kwon and
                  Kristi{\'{a}}n Koz{\'{a}}k and
                  Christopher Gates and
                  Tudor Dumitras},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {The Broken Shield: Measuring Revocation Effectiveness in the Windows
                  Code-Signing {PKI}},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {851--868},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/kim},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KimKKGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-02931,
  author       = {Kristi{\'{a}}n Koz{\'{a}}k and
                  Bum Jun Kwon and
                  Doowon Kim and
                  Christopher Gates and
                  Tudor Dumitras},
  title        = {Issued for Abuse: Measuring the Underground Trade in Code Signing
                  Certificate},
  journal      = {CoRR},
  volume       = {abs/1803.02931},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.02931},
  eprinttype    = {arXiv},
  eprint       = {1803.02931},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-02931.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenHCGHR17,
  author       = {Shang{-}Tse Chen and
                  Yufei Han and
                  Duen Horng Chau and
                  Christopher S. Gates and
                  Michael Hart and
                  Kevin A. Roundy},
  title        = {Predicting Cyber Threats with Virtual Security Products},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {189--199},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134617},
  doi          = {10.1145/3134600.3134617},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenHCGHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiRGV17,
  author       = {Bo Li and
                  Kevin A. Roundy and
                  Christopher S. Gates and
                  Yevgeniy Vorobeychik},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Large-Scale Identification of Malicious Singleton Files},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {227--238},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029815},
  doi          = {10.1145/3029806.3029815},
  timestamp    = {Wed, 16 Sep 2020 11:48:10 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiRGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/SoskaGRC17,
  author       = {Kyle Soska and
                  Christopher S. Gates and
                  Kevin A. Roundy and
                  Nicolas Christin},
  title        = {Automatic Application Identification from Billions of Files},
  booktitle    = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13
                  - 17, 2017},
  pages        = {2021--2030},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3097983.3098196},
  doi          = {10.1145/3097983.3098196},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/SoskaGRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CenGSL15,
  author       = {Lei Cen and
                  Christopher S. Gates and
                  Luo Si and
                  Ninghui Li},
  title        = {A Probabilistic Discriminative Model for Android Malware Detection
                  with Decompiled Source Code},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {4},
  pages        = {400--412},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2355839},
  doi          = {10.1109/TDSC.2014.2355839},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/CenGSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JorgensenCGLPY15,
  author       = {Zach Jorgensen and
                  Jing Chen and
                  Christopher S. Gates and
                  Ninghui Li and
                  Robert W. Proctor and
                  Ting Yu},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Dimensions of Risk in Mobile Applications: {A} User Study},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699108},
  doi          = {10.1145/2699026.2699108},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/JorgensenCGLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ParkMCXGL15,
  author       = {Youngja Park and
                  Ian M. Molloy and
                  Suresh N. Chari and
                  Zenglin Xu and
                  Christopher S. Gates and
                  Ninghui Li},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Learning from Others: User Anomaly Detection Using Anomalous Samples
                  from Other Users},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {396--414},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_20},
  doi          = {10.1007/978-3-319-24177-7\_20},
  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ParkMCXGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GatesLPSQPNM14,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Hao Peng and
                  Bhaskar Pratim Sarma and
                  Yuan Qi and
                  Rahul Potharaju and
                  Cristina Nita{-}Rotaru and
                  Ian M. Molloy},
  title        = {Generating Summary Risk Scores for Mobile Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {238--251},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2302293},
  doi          = {10.1109/TDSC.2014.2302293},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GatesLPSQPNM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GatesCLP14,
  author       = {Christopher S. Gates and
                  Jing Chen and
                  Ninghui Li and
                  Robert W. Proctor},
  title        = {Effective Risk Communication for Android Apps},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {252--265},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.58},
  doi          = {10.1109/TDSC.2013.58},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GatesCLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GatesLXCMP14,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Zenglin Xu and
                  Suresh N. Chari and
                  Ian M. Molloy and
                  Youngja Park},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Detecting Insider Information Theft Using Features from File Access
                  Logs},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {383--400},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_22},
  doi          = {10.1007/978-3-319-11212-1\_22},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GatesLXCMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ParkGG13,
  author       = {Youngja Park and
                  Christopher S. Gates and
                  Stephen C. Gates},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Estimating Asset Sensitivity by Profiling Users},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {94--110},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_6},
  doi          = {10.1007/978-3-642-40203-6\_6},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ParkGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GatesLCP12,
  author       = {Christopher S. Gates and
                  Ninghui Li and
                  Jing Chen and
                  Robert W. Proctor},
  editor       = {Robert H'obbes' Zakon},
  title        = {CodeShield: towards personalized application whitelisting},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {279--288},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420992},
  doi          = {10.1145/2420950.2420992},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GatesLCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PengGSLQPNM12,
  author       = {Hao Peng and
                  Christopher S. Gates and
                  Bhaskar Pratim Sarma and
                  Ninghui Li and
                  Yuan Qi and
                  Rahul Potharaju and
                  Cristina Nita{-}Rotaru and
                  Ian M. Molloy},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Using probabilistic generative models for ranking risks of Android
                  apps},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {241--252},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382224},
  doi          = {10.1145/2382196.2382224},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PengGSLQPNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SarmaLGPNM12,
  author       = {Bhaskar Pratim Sarma and
                  Ninghui Li and
                  Christopher S. Gates and
                  Rahul Potharaju and
                  Cristina Nita{-}Rotaru and
                  Ian M. Molloy},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Android permissions: a perspective combining risks and benefits},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295141},
  doi          = {10.1145/2295136.2295141},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/SarmaLGPNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChenLGM10,
  author       = {Hong Chen and
                  Ninghui Li and
                  Christopher S. Gates and
                  Ziqing Mao},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {Towards analyzing complex operating system access control configurations},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809848},
  doi          = {10.1145/1809842.1809848},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ChenLGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics