Revealing Hidden Context: Improving Users' Mental Models of Personal Firewalls - Fahimeh Raja et al - Talk given at Symposium On Usable Privacy and Security (SOUPS), July 2009, at Google in Mountain View, California, US.: - LERSSE-PRESENTATION-2009-078
 
People who viewed this page also viewed:
(798)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(754)  Towards Agile Security Assurance - Konstantin Beznosov et al - Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54 - LERSSE-RefConfPaper-2005-015
(742)  Design and Analysis of a Social Botnet - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Design and Analysis of a Social Botnet. Elsevier Journal of Computer Network - Special Issue on Botnets, 2012.: - LERSSE-RefJnlPaper-2012-002
(710)  Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders - Ildar Muslukhov et al - Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester and Konstantin Beznosov, Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services companion: - LERSSE-RefConfPaper-2013-002
(710)  The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems - San-Tsai Sun et al - San-Tsai Sun and Konstantin Beznosov. The devil is in the (implementation) details: An empirical analysis of OAuth SSO systems. In Proceedings of ACM Conference on Computer and Communications Security (CCS'12), October 2012.: - LERSSE-RefConfPaper-2012-003


Download history: