Christopher Gates
Christopher Gates
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
A probabilistic discriminative model for android malware detection with decompiled source code
L Cen, CS Gates, L Si, N Li
IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014
Effective risk communication for android apps
CS Gates, J Chen, N Li, RW Proctor
IEEE Transactions on dependable and secure computing 11 (3), 252-265, 2013
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
Continuous fiber composite reinforced synthetic wood elements
A Branca
US Patent App. 10/242,187, 2004
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
Reagents for oligonucleotide cleavage and deprotection
JS Nelson
US Patent 6,664,388, 2003
Influence of risk/safety information framing on android app-installation decisions
J Chen, CS Gates, N Li, RW Proctor
Journal of Cognitive Engineering and Decision Making 9 (2), 149-168, 2015
Dimensions of risk in mobile applications: A user study
Z Jorgensen, J Chen, CS Gates, N Li, RW Proctor, T Yu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
Detecting insider information theft using features from file access logs
C Gates, N Li, Z Xu, SN Chari, I Molloy, Y Park
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K Kozák, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
CodeShield: Towards personalized application whitelisting
C Gates, N Li, J Chen, R Proctor
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Systems and methods for categorizing security incidents
M Dell'Amico, C Gates, M Hart, K Roundy
US Patent 10,341,377, 2019
Framework for domain-independent archetype modeling
D Oglesby, K Schloegel, D Bhatt, E Engstrom
US Patent App. 10/242,201, 2003
Learning from others: User anomaly detection using anomalous samples from other users
Y Park, IM Molloy, SN Chari, Z Xu, C Gates, N Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Systems and methods for detecting security blind spots
C Gates, S Miskovic, M Hart, K Roundy
US Patent 10,091,231, 2018
Predicting cyber threats with virtual security products
ST Chen, Y Han, DH Chau, C Gates, M Hart, KA Roundy
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20