Christopher Gates
Christopher Gates
Dirección de correo verificada de
Citado por
Citado por
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
A probabilistic discriminative model for android malware detection with decompiled source code
L Cen, CS Gates, L Si, N Li
IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014
Effective risk communication for android apps
CS Gates, J Chen, N Li, RW Proctor
IEEE Transactions on dependable and secure computing 11 (3), 252-265, 2013
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the seventh ACM on conference on data and application …, 2017
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
Continuous fiber composite reinforced synthetic wood elements
A Branca
US Patent App. 10/242,187, 2004
Reagents for oligonucleotide cleavage and deprotection
JS Nelson
US Patent 6,664,388, 2003
Influence of risk/safety information framing on android app-installation decisions
J Chen, CS Gates, N Li, RW Proctor
Journal of Cognitive Engineering and Decision Making 9 (2), 149-168, 2015
Dimensions of risk in mobile applications: A user study
Z Jorgensen, J Chen, CS Gates, N Li, RW Proctor, T Yu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
Detecting insider information theft using features from file access logs
C Gates, N Li, Z Xu, SN Chari, I Molloy, Y Park
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
Systems and methods for categorizing security incidents
M Dell'Amico, C Gates, M Hart, K Roundy
US Patent 10,341,377, 2019
CodeShield: Towards personalized application whitelisting
C Gates, N Li, J Chen, R Proctor
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Learning from others: User anomaly detection using anomalous samples from other users
Y Park, IM Molloy, SN Chari, Z Xu, C Gates, N Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Automatic application identification from billions of files
K Soska, C Gates, KA Roundy, N Christin
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
Framework for domain-independent archetype modeling
D Oglesby, K Schloegel, D Bhatt, E Engstrom
US Patent App. 10/242,201, 2003
Towards analyzing complex operating system access control configurations
H Chen, N Li, CS Gates, Z Mao
Proceedings of the 15th ACM symposium on Access control models and …, 2010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20