Effectiveness of IT Security Tools in Practice - Fahimeh Raja et al - Fahimeh Raja, Kasia Muldner, and Konstantin Beznosovz. Effectiveness of it security tools in practice. Technical Report LERSSE-TR-2009-33, University of British Columbia, March 2008.: - LERSSE-REPORT-2009-033
 
People who viewed this page also viewed:
(405)  Design and Analysis of a Social Botnet - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Design and Analysis of a Social Botnet. Elsevier Journal of Computer Network - Special Issue on Botnets, 2012.: - LERSSE-RefJnlPaper-2012-002
(383)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(367)  Towards Agile Security Assurance - Konstantin Beznosov et al - Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54 - LERSSE-RefConfPaper-2005-015
(356)  Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model - San-Tsai Sun et al - San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. Investigating users' perspectives of web single sign-on: Conceptual gaps and acceptance model. Accepted for publication in ACM Transactions on Internet Technology (TOIT) on June 4th, 2013.: - LERSSE-RefJnlPaper-2013-001
(355)  Heuristics for Evaluating IT Security Management Tools - Pooya Jaferian et al - Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov, Heuristics for Evaluating IT Security Management Tools, Accepted in Human–Computer Interaction, doi:10.1080/07370024.2013.819198.: - LERSSE-RefJnlPaper-2013-002


Download history: