Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Stop to Unlock: Improving the Security of Android Unlock Patterns
View More Papers
Will They Share? Predicting Location Sharing Behaviors of Smartphone...
Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)
Read MoreAutomatic Retrieval of Privacy Factors from IoMT Policies: ML...
Nyteisha Bookert, Mohd Anwar (North Carolina Agricultural and Technical State University)
Read MoreCybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges...
Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
Read MoreWhy Do Programmers Do What They Do? A Theory...
Lavanya Sajwan, James Noble, Craig Anslow (Victoria University of Wellington), Robert Biddle (Carleton University)
Read More