Leakwatch: Estimating information leakage from java programs T Chothia, Y Kawamoto, C Novakovic European Symposium on Research in Computer Security, 219-236, 2014 | 60 | 2014 |
A tool for estimating information leakage T Chothia, Y Kawamoto, C Novakovic International Conference on Computer Aided Verification, 690-695, 2013 | 55 | 2013 |
An Offline Capture The {Flag-Style} Virtual Machine and an Assessment of Its Value for Cybersecurity Education T Chothia, C Novakovic 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 49 | 2015 |
Probabilistic point-to-point information leakage T Chothia, Y Kawamoto, C Novakovic, D Parker 2013 IEEE 26th Computer Security Foundations Symposium, 193-205, 2013 | 39 | 2013 |
BrowserAudit: automated testing of browser security features C Hothersall-Thomas, S Maffeis, C Novakovic Proceedings of the 2015 international symposium on software testing and …, 2015 | 12 | 2015 |
The unbearable lightness of monitoring: Direct monitoring in BitTorrent T Chothia, M Cova, C Novakovic, CG Toro International conference on security and privacy in communication systems …, 2012 | 11 | 2012 |
Choose your pwn adventure: Adding competition and storytelling to an introductory cybersecurity course T Chothia, C Novakovic, AI Radu, RJ Thomas Transactions on Edutainment XV, 141-172, 2019 | 8 | 2019 |
Software adaptation for an unmanned undersea vehicle A Pfeffer, C Wu, G Fry, K Lu, S Marotta, M Reposa, Y Shi, TKS Kumar, ... IEEE Software 36 (2), 91-96, 2019 | 5 | 2019 |
LeakWatch T Chothia, Y Kawamoto, C Novakovic | 3 | |
Automatically calculating quantitative integrity measures for imperative programs T Chothia, C Novakovic, RR Singh Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2014 | 1 | 2014 |
Automated formal analysis of side-channel attacks on probabilistic systems C Novakovic, D Parker European Symposium on Research in Computer Security, 319-337, 2019 | | 2019 |
Calculating Quantitative Integrity and Secrecy for Imperative Programs T Chothia, C Novakovic, RR Singh International Journal of Secure Software Engineering (IJSSE) 6 (2), 23-46, 2015 | | 2015 |
Confidence Interval of Estimated Min-Entropy Leakage T Chothia, Y Kawamoto, C Novakovic | | 2013 |
User Manual for leakiEst v. 1.4–a Tool for Estimating Information Leakage T Chothia, Y Kawamoto, C Novakovic | | |
統計的手法によるプログラムの定量的情報流解析 T Chothia, Y Kawamoto, C Novakovic | | |
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION T Chothia, C Novakovic | | |