1.
|
Harvesting the Low-hanging Fruits: Defending Against Automated Large-Scale Cyber-Intrusions by Focusing on the Vulnerable Populations
/ Hassan Halawa ; Konstantin Beznosov ; Yazan Boshmaf ; Baris Coskun ; et al
[LERSSE-RefConfPaper-2016-003]
The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-technical systems is reactive and victim-agnostic [...]
Published in In Proceedings of the New Security Paradigms Workshop (NSPW), September 26-29, 2016, Granby, CO, USA.:
Fulltext: PDF PDF (PDFA);
|
2.
|
Human, Organizational and Technological Factors of IT Security
/ Kasia Muldner
[LERSSE-PRESENTATION-2008-065]
Given that Information Technology (IT) has become pervasive in today’s organizations, properly securing systems is critical. [...]
Published in Kasia Muldner, " Human, Organizational and Technological Factors of IT Security", Invited Talk at Acadia University, Wofville, N.S., Canada, 25 January, 2007.:
Transfer from CDS 0.99.7: PDF;
|
3.
|
Improving Practical Security Engineering: Overview of the Ongoing Research
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2005-022]
Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the limitations of today security and software technologies [...]
Published in Konstantin Beznosov, "Improving Practical Security Engineering: Overview of the Ongoing Research," talk given at the Department of Computer Science, Heverlee, Belgium, Catholic University of Leuven, 20 December, 2004. :
Transfer from CDS 0.99.7: PDF;
|
4.
|
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
/ Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al
[LERSSE-PRESENTATION-2015-001]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: PDF PDF (PDFA);
|
5.
|
Mobile Applications for Public Sector: Balancing Usability and Security
/ Yurij Natchetoi ; Konstantin Beznosov ; Viktor Kaufman
[LERSSE-RefConfPaper-2009-032]
Development of mobile software applications for use in specific domains such as Public Security must conform to stringent security requirements [...]
Published in Yurij Natchetoi, Konstantin Beznosov, Viktor Kaufman, “Mobile Applications for Public Sector: Balancing Usability and Security” in the Collaboration and the Knowledge Economy: Issues, Applications, Case Studies, Paul Cunningham and Miriam Cunningham (Eds), IOS Press, 2008 Amsterdam, ISBN 978–1–58603–924-0, Stockholm, Sweden, 22 - 24 October 2008, article #117, 6 pages.:
Transfer from CDS 0.99.7: PDF;
|
6.
|
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
/ Yazan Boshmaf ; Dionysios Logothetis ; Georgos Siganos ; Jorge Leria ; et al
[LERSSE-RefConfPaper-2014-004]
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. [...]
Published in Boshmaf et al. "Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs" In proceedings the 2015 Network and Distributed System Security Symposium (NDSS'15), San Diego, USA.:
Fulltext: NDSS_260_Final - PDF PDF (PDFA); boshmaf_ndss_2015 - PDF PDF (PDFA);
|
7.
|
Toward Improving Availability and Performance of Enterprise Authorization Services
/ Konstantin Beznosov
[LERSSE-PRESENTATION-2009-001]
In currently deployed large enterprise systems, policy enforcement points (PDPs) are commonly implemented as logically centralized authorization servers [...]
Published in Talk given at the Faculty of Computer Science, Technical University of Dortmund.:
Transfer from CDS 0.99.7: PDF;
|
8.
|
Security Analysis of Malicious Socialbots on the Web
/ Yazan Boshmaf
[LERSSE-THESIS-2015-002]
The open nature of the Web, online social networks (OSNs) in particular, makes it possible to design socialbots—automation software that controls fake accounts in a target OSN, and has the ability to perform basic activities similar to those of real users. [...]
Published in Yazan Boshmaf, Security Analysis of Malicious Socialbots on the Web, PhD Dissertation, UBC, 2015:
Fulltext: PDF PDF (PDFA);
|
9.
|
Thwarting Fake OSN Accounts by Predicting their Victims
/ Yazan Boshmaf ; Matei Ripeanu ; Konstantin Beznosov
[LERSSE-RefConfPaper-2015-005]
Traditional defense mechanisms for fighting against automated fake accounts in online social networks are victim-agnostic. [...]
Published in Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov. Thwarting Fake OSN Accounts by Predicting their Victims. In Proceedings of the 2015 Workshop on Artificial Intelligent and Security Workshop (AISec'15), Denver, Colorado, USA, Oct, 2015:
Fulltext: PDF PDF (PDFA);
|
10.
|
Phishing threat avoidance behaviour: An empirical investigation
/ Nalin Asanka Gamagedara Arachchilage ; Steve Love ; Konstantin Beznosov
[LERSSE-RefJnlPaper-2016-001]
Abstract Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. [...]
Published in Nalin Asanka Gamagedara Arachchilage, Steve Love, Konstantin Beznosov, Phishing threat avoidance behaviour: An empirical investigation, Computers in Human Behavior, Volume 60, July 2016, Pages 185-197, ISSN 0747-5632:
Fulltext: PDF PDF (PDFA);
|