Bertrand Sobesto
Bertrand Sobesto
Senior IT Security Engineer, University of Maryland
Verified email at - Homepage
Cited by
Cited by
Restrictive deterrent effects of a warning banner in an attacked computer system
D Maimon, M Alper, B Sobesto, M Cukier
Criminology 52 (1), 33-59, 2014
Daily trends and origin of computer-focused crimes against a large university computer network: An application of the routine-activities and lifestyle perspective
D Maimon, A Kamerdze, M Cukier, B Sobesto
British Journal of Criminology 53 (2), 319-343, 2013
The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace
T Wilson, D Maimon, B Sobesto, M Cukier
Journal of Research in Crime and Delinquency 52 (6), 829-855, 2015
Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors
A Testa, D Maimon, B Sobesto, M Cukier
Criminology & Public Policy 16 (3), 689-726, 2017
Characterizing attackers and attacks: An empirical study
G Salles-Loustau, R Berthier, E Collange, B Sobesto, M Cukier
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing …, 2011
Does malware detection improve with diverse antivirus products? an empirical study
I Gashi, B Sobesto, V Stankovic, M Cukier
Computer Safety, Reliability, and Security: 32nd International Conference …, 2013
A study of the relationship between antivirus regressions and label changes
I Gashi, B Sobesto, S Mason, V Stankovic, M Cukier
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
{DarkNOC}: dashboard for honeypot management
B Sobesto, M Cukier, M Hiltunen, D Kormann, G Vesonder, R Berthier
25th Large Installation System Administration Conference (LISA 11), 2011
Predictably deterrable? The case of system trespassers
D Maimon, A Testa, B Sobesto, M Cukier, W Ren
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019
Comparing detection capabilities of antivirus products: an empirical study with different versions of products from the same vendors
A Algaith, I Gashi, B Sobesto, M Cukier, S Haxhijaha, G Bajrami
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
A practical experience on evaluating intrusion prevention system event data as indicators of security issues
RS Miani, BB Zarpelao, B Sobesto, M Cukier
2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 296-305, 2015
Empirical studies based on honeypots for characterizing attackers behavior
B Sobesto
University of Maryland, College Park, 2015
Are computer focused crimes impacted by system configurations? an empirical study
B Sobesto, M Cukier, D Maimon
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
Diversity with AntiVirus products: Additional empirical studies
I Gashi, V Stankovic, M Cukier, B Sobesto
Technical report: Does Malware Detection Improve with Diverse Antivirus Products? An Empirical Study
M Cukier, I Gashi, B Sobesto, V Stankovic
The system can't perform the operation now. Try again later.
Articles 1–15