Zobrazeno 1 - 10
of 208
pro vyhledávání: '"L. Mazurek"'
Publikováno v:
Veterinární Medicína, Vol 63, Iss 5, Pp 225-228 (2018)
Canine babesiosis is a tickborne, protozoal, haemoparasitic disease that can cause varying degrees of haemolytic anaemia, splenomegaly, thrombocytopenia and fever. Babesia organisms are frequently classified as either large or small. All small Babesi
Externí odkaz:
https://doaj.org/article/9e86895c9d8b4dc3bd8f812437fa7ae5
Autor:
Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Nathan Reitinger, Michelle L. Mazurek
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 3, Pp 453-473 (2021)
With the aim of increasing online privacy, we present a novel, machine-learning based approach to blocking one of the three main ways website visitors are tracked online—canvas fingerprinting. Because the act of canvas fingerprinting uses, at its c
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Publikováno v:
IEEE Security & Privacy. 18:51-58
Compliance programs help protect organizations' intellectual property and valuable resources through mandated security controls; however, organizations often conflate compliance with strong security. Understanding the security gaps that place fully c
Autor:
Rock Stevens, Daniel Votipka, Josiah Dykstra, Fernando Tomlinson, Erin Quartararo, Colin Ahern, Michelle L. Mazurek
Publikováno v:
CHI Conference on Human Factors in Computing Systems.
Publikováno v:
Proceedings 2022 Network and Distributed System Security Symposium.
Publikováno v:
WPES@CCS
King's College London
King's College London
Although end-to-end encryption (E2EE) is more widely available than ever before, many users remain confused about its security properties. As a result, even users with access to E2EE tools turn to less secure alternatives for sending private informat
Autor:
Mary Nicole Dugay Punzalan, Michelle L. Mazurek, Yla R. Tausczik, Seth M. Rabin, Daniel Votipka
Publikováno v:
EuroS&P
Reverse engineering is a complex task. As with many other expert tasks, reverse engineers rely on colleagues and the broader reverse engineering community to provide guidance and develop knowledge necessary to achieve their goals. For example, it is
Publikováno v:
IEEE Security & Privacy. 17:35-42
Threat modeling, a structured process for identifying risks and developing mitigation strategies, has never been systematically evaluated in a real environment. Our case study at the New York City Cyber Commandmthe primary digital defense organizatio