M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)
A First Look at the Usability of OpenVAS Vulnerability Scanner
View More Papers
Continuous Smartphone Authentication using Wristbands
Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)
Read MoreAnalyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MorePhishing awareness and education – When to best remind?
Benjamin Maximilian Berens (SECUSO, Karlsruhe Institute of Technology), Katerina Dimitrova, Mattia Mossano (SECUSO, Karlsruhe Institute of Technology), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology)
Read More