Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones - Diogo Marques et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-002
 
People who viewed this page also viewed:
(102)  I’m too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails - Jun Ho Huh et al - J. H. Huh, H. Kim, S. S. V. Rayala, R. B. Bobba, K. Beznosov, “I’m too busy to reset my LinkedIn password: On the effectiveness of password reset emails,” to appear in Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2017, 5 pages.: - LERSSE-RefConfPaper-2017-002
(100)  Towards Understanding the Link Between Age and Smartphone Authentication - Lina Qiu et al - In Proceedings of CHI 2019, Glasgow, UK: - LERSSE-RefConfPaper-2019-001
(99)  Android Rooting: Methods, Detection, and Evasion - San-Tsai Sun et al - San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.: - LERSSE-RefConfPaper-2015-007
(98)  Characterizing Social Insider Attacks on Facebook - Wali Ahmed Usmani et al - W. A. Usmani, D. Marques, I. Beschastnikh, K. Beznosov, T. Guerreiro, L. Carrico, “Characterizing Social Insider Attacks on Facebook,” to appear in Proc. of the ACM Conference on Human Factors in Computing Systems (CHI), 2017, 11 pages.: - LERSSE-RefConfPaper-2017-003
(95)  Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs - Yazan Boshmaf et al - Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.: - LERSSE-RefConfPaper-2014-004


Download history: