Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Stop to Unlock: Improving the Security of Android Unlock Patterns
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreSecurity Awareness Training through Experiencing the Adversarial Mindset
Jens Christian Dalgaard, Niek A. Janssen, Oksana Kulyuk, Carsten Schurmann (IT University of Copenhagen)
Read MoreVision: Comparison of AI-assisted Policy Development Between Professionals and...
Rishika Thorat (Purdue University), Tatiana Ringenberg (Purdue University)
Read MoreDo Privacy Labels Answer Users' Privacy Questions?
Shikun Zhang, Norman Sadeh (Carnegie Mellon University)
Read More