M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)
A First Look at the Usability of OpenVAS Vulnerability Scanner
View More Papers
“Lose Your Phone, Lose Your Identity”: Exploring Users’ Perceptions...
Michael Lutaaya, Hala Assal, Khadija Baig, Sana Maqsood, Sonia Chiasson (Carleton University)
Read MoreAnalyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreMacOS versus Microsoft Windows: A Study on the Cybersecurity...
Cem Topcuoglu (Northeastern University), Andrea Martinez (Florida International University), Abbas Acar (Florida International University), Selcuk Uluagac (Florida International University), Engin Kirda (Northeastern University)
Read More