Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones - Diogo Marques et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-002
 
People who viewed this page also viewed:
(381)  The Socialbot Network: When Bots Socialize for Fame and Money - Yazan Boshmaf et al - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC'11), December 2011. For the technical report, please refer to http://lersse-dl.ece.ubc.ca/record/272: - LERSSE-RefConfPaper-2011-008
(350)  Towards Understanding the Link Between Age and Smartphone Authentication - Lina Qiu et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-001
(350)  Forecasting Suspicious Account Activity at Large-Scale Online Service Providers - Hassan Halawa et al - In the proceedings of Twenty-Third International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, 2019: - LERSSE-RefConfPaper-2018-003
(344)  Snooping on Mobile Phones: Prevalence and Trends - Diogo Marques et al - Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Konstantin Beznosov and Luis Carrico. 2016. Snooping on Mobile Phones: Prevalence and Trends, SOUPS'16: Symposium On Usable Privacy and Security. Denver, Colorado, USA: - LERSSE-RefConfPaper-2016-002
(342)  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences - Primal Wijesekera et al - P. Wijesekera, A. Baokar, L.Tsai, J. Reardon, S. Egelman, D. Wagner, K. Beznosov, “The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences,” in IEEE Symposium on Security and Privacy (IEEE S&P), San-Jose, CA, May 2017, 17 pages.: - LERSSE-RefConfPaper-2017-004


Download history: