Challenges in evaluating complex IT security management systems - Pooya Jaferian et al - P. Jaferian, K. Hawkey, and K. Beznosov. Challenges in evaluating complex IT security management systems. In SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.: - LERSSE-RefConfPaper-2010-005
 
People who viewed this page also viewed:
(1017)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(966)  Towards Agile Security Assurance - Konstantin Beznosov et al - Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54 - LERSSE-RefConfPaper-2005-015
(932)  It's Too Complicated, So I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls - Fahimeh Raja et al - Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, and Kellogg S. Booth. It's Too Complicated, So I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls. In Proceedings of the Third ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), October 4, 2010.: - LERSSE-RefConfPaper-2010-008
(926)  Design and Analysis of a Social Botnet - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. Design and Analysis of a Social Botnet. Elsevier Journal of Computer Network - Special Issue on Botnets, 2012.: - LERSSE-RefJnlPaper-2012-002
(914)  Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders - Ildar Muslukhov et al - Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester and Konstantin Beznosov, Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services companion: - LERSSE-RefConfPaper-2013-002


Download history: