Forecasting Suspicious Account Activity at Large-Scale Online Service Providers - Hassan Halawa et al - In the proceedings of Twenty-Third International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, 2019: - LERSSE-RefConfPaper-2018-003
 
People who viewed this page also viewed:
(422)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(418)  Source Attribution of Cryptographic API Misuse in Android Applications - Ildar Muslukhov et al - Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov. Source Attribution of Cryptographic API Misuse in Android Applications. Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS '18), 2018.: - LERSSE-RefConfPaper-2018-002
(409)  I’m too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails - Jun Ho Huh et al - J. H. Huh, H. Kim, S. S. V. Rayala, R. B. Bobba, K. Beznosov, “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails,” to appear in Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2017, 5 pages.: - LERSSE-RefConfPaper-2017-002
(406)  Towards Agile Security Assurance - Konstantin Beznosov et al - Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54 - LERSSE-RefConfPaper-2005-015
(400)  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences - Primal Wijesekera et al - P. Wijesekera, A. Baokar, L.Tsai, J. Reardon, S. Egelman, D. Wagner, K. Beznosov, “The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences,” in IEEE Symposium on Security and Privacy (IEEE S&P), San-Jose, CA, May 2017, 17 pages.: - LERSSE-RefConfPaper-2017-004


Download history: