An offline capture the {Flag-Style} virtual machine and an assessment of its value for cybersecurity education T Chothia, C Novakovic 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 88* | 2015 |
Leakwatch: Estimating information leakage from java programs T Chothia, Y Kawamoto, C Novakovic Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 74 | 2014 |
A tool for estimating information leakage T Chothia, Y Kawamoto, C Novakovic International Conference on Computer Aided Verification, 690-695, 2013 | 66 | 2013 |
Probabilistic point-to-point information leakage T Chothia, Y Kawamoto, C Novakovic, D Parker 2013 IEEE 26th Computer Security Foundations Symposium, 193-205, 2013 | 40 | 2013 |
BrowserAudit: automated testing of browser security features C Hothersall-Thomas, S Maffeis, C Novakovic Proceedings of the 2015 international symposium on software testing and …, 2015 | 21 | 2015 |
An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education. 2015 USENIX Summit on Gaming T Chothia, C Novakovic Games, and Gamification in Security Education (3GSE 15), 2015 | 13 | 2015 |
The unbearable lightness of monitoring: Direct monitoring in BitTorrent T Chothia, M Cova, C Novakovic, CG Toro Security and Privacy in Communication Networks: 8th International ICST …, 2013 | 13 | 2013 |
Choose your pwn adventure: Adding competition and storytelling to an introductory cybersecurity course T Chothia, C Novakovic, AI Radu, RJ Thomas Transactions on Edutainment XV, 141-172, 2019 | 12 | 2019 |
Software adaptation for an unmanned undersea vehicle A Pfeffer, C Wu, G Fry, K Lu, S Marotta, M Reposa, Y Shi, TKS Kumar, ... IEEE Software 36 (2), 91-96, 2019 | 10 | 2019 |
LeakWatch T Chothia, Y Kawamoto, C Novakovic | 3 | |
Automated formal analysis of side-channel attacks on probabilistic systems C Novakovic, D Parker Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 2 | 2019 |
Automatically calculating quantitative integrity measures for imperative programs T Chothia, C Novakovic, RR Singh International Workshop on Data Privacy Management, 250-265, 2014 | 1 | 2014 |
Calculating Quantitative Integrity and Secrecy for Imperative Programs T Chothia, C Novakovic, RR Singh International Journal of Secure Software Engineering (IJSSE) 6 (2), 23-46, 2015 | | 2015 |
Confidence Interval of Estimated Min-Entropy Leakage T Chothia, Y Kawamoto, C Novakovic | | 2013 |
BrowserAudit: Automated Testing of Browser Security Features S Maffeis, C Novakovic | | |
User Manual for leakiEst v. 1.4–a Tool for Estimating Information Leakage T Chothia, Y Kawamoto, C Novakovic | | |
統計的手法によるプログラムの定量的情報流解析 T Chothia, Y Kawamoto, C Novakovic | | |
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION T Chothia, C Novakovic | | |