Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 19 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
1.
To Befriend Or Not? A Model of Friend Request Acceptance on Facebook / Hootan Rashtian ; Yazan Boshmaf ; Pooya Jaferian ; Konstantin Beznosov [LERSSE-RefConfPaper-2014-002]
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. [...]
Published in Rashtian, H., Boshmaf, Y., Jaferian, P., Beznosov, K. (2014, July). To Befriend Or Not? A Model of Friend Request Acceptance on Facebook. In Proceedings of the 10th symposium on Usable Privacy and Security. ACM.:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
2.
Towards understanding how users decide about friendship requests in Online Social Networks / Hootan Rashtian [LERSSE-THESIS-2014-002]
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. [...]
Published in Hootan Rashtian, "Towards understanding how users decide about friendship requests in Online Social Networks," MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2014, pp.108:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
3.
Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders / Ildar Muslukhov ; Yazan Boshmaf ; Cynthia Kuo ; Jonathan Lester ; et al [LERSSE-RefConfPaper-2013-002]
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. [...]
Published in Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester and Konstantin Beznosov, Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services companion:
Fulltext: paper.rev2 - Download fulltextPDF; paper - Download fulltextPDF Download fulltextPDF (PDFA); ASONAM_2013 - Download fulltextPDF Download fulltextPDF (PDFA);
4.
On the Impact of Touch ID on iPhone Passcodes / Ivan Cherapau ; Ildar Muslukhov ; Nalin Asanka ; Konstantin Beznosov [LERSSE-RefConfPaper-2015-001]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-RefConfPaper-2015-001:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
5.
Towards Agile Security Assurance / Konstantin Beznosov [LERSSE-PRESENTATION-2006-057]
Agile development methods are promising to become the next generation replacing waterfall development. [...]
Published in Konstantin Beznosov "Towards Agile Security Assurance," presentation given at the Calgary Agile Methods User Group (CAMUG), Calgary, Alberta, Canada, University of Calgary, 3 October, 2006.:
Transfer from CDS 0.99.7: Download fulltextPDF;
6.
Towards Agile Security Assurance / Konstantin Beznosov [LERSSE-PRESENTATION-2005-045]
Agile development methods are promising to become the next generation replacing water-fall development. [...]
Published in Konstantin Beznosov, "Towards Agile Security Assurance," presentation given at the Department of Computer Science, Waterloo, Ontario, Canada, University of Waterloo, 18 October, 2004. :
Transfer from CDS 0.99.7: Download fulltextPDF;
7.
Towards Agile Security Assurance / Konstantin Beznosov ; Philippe Kruchten [LERSSE-PRESENTATION-2005-046]
Agile development methods are promising to become the next generation replacing water-fall development. [...]
Published in Konstantin Beznosov, Philippe Kruchten, "Towards Agile Security Assurance," presentation given at The New Security Paradigms Workshop (NSPW), White Point Beach Resort, Nova Scotia, Canada, 20 September, 2004. :
Transfer from CDS 0.99.7: Download fulltextPDF;
8.
Towards Agile Security Assurance / Konstantin Beznosov ; Philippe Kruchten [LERSSE-RefConfPaper-2005-015]
Agile development methods are promising to become the next generation replacing water-fall development. [...]
Published in Proceedings of the workshop on New security paradigms, Nova Scotia, Canada: (2004) pp. 47-54
Transfer from CDS 0.99.7: Download fulltextPDF;
9.
Toward Understanding Distributed Cognition in IT Security Management: The Role of Cues and Norms / David Botta ; Kasia Muldner ; Kirstie Hawkey ; Konstantin Beznosov [LERSSE-RefJnlPaper-2010-002]
Information technology security management (ITSM) entails significant challenges, including the distribution of tasks and stakeholders across the organization, the need for security practitioners to cooperate with others, and technological complexity. [...]
Published in 1. D. Botta, K. Muldner, K. Hawkey, and K. Beznosov, “Toward Understanding Distributed Cognition in IT Security Management: The Role of Cues and Norms,” accepted for publication to the International Journal of Cognition, Technology and Work on 16 / Aug / 2010.:
Transfer from CDS 0.99.7: Download fulltextPDF;
10.
Security Analysis of Malicious Socialbots on the Web / Yazan Boshmaf [LERSSE-THESIS-2015-002]
The open nature of the Web, online social networks (OSNs) in particular, makes it possible to design socialbots—automation software that controls fake accounts in a target OSN, and has the ability to perform basic activities similar to those of real users. [...]
Published in Yazan Boshmaf, Security Analysis of Malicious Socialbots on the Web, PhD Dissertation, UBC, 2015:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);