Harvesting the Low-hanging Fruits: Defending Against Automated Large-Scale Cyber-Intrusions
by Focusing on the Vulnerable Population - Hassan Halawa et al - In Proceedings of the New Security Paradigms Workshop (NSPW), September 26-29, 2016, Granby, CO, USA.: - LERSSE-RefConfPaper-2016-003
 
People who viewed this page also viewed:
(54)  Snooping on Mobile Phones: Prevalence and Trends - Diogo Marques et al - Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Konstantin Beznosov and Luis Carrico. 2016. Snooping on Mobile Phones: Prevalence and Trends, SOUPS'16: Symposium On Usable Privacy and Security. Denver, Colorado, USA: - LERSSE-RefConfPaper-2016-002
(53)  Surpass: System-initiated User-replaceable Passwords - Jun Ho Huh et al - Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.: - LERSSE-RefConfPaper-2015-006
(52)  On the Impact of Touch ID on iPhone Passcodes - Ivan Cherapau et al - LERSSE-RefConfPaper-2015-001: - LERSSE-RefConfPaper-2015-001
(50)  Android Rooting: Methods, Detection, and Evasion - San-Tsai Sun et al - San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.: - LERSSE-RefConfPaper-2015-007
(48)  A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks - Hyoungshick Kim et al - Kim, K. Beznosov, and E. Yoneki, “A Study on the Influential Neighbors to Maximize Information Diffusion in Online Social Networks” in Computational Social Networks, February 2015, v2n3.: - LERSSE-RefConfPaper-2015-002


Download history: