Chris Fennell (Walmart)
Evaluating the Impact of Cybersecurity Training: Exploring the Utility of Behavior Intentions and Security Best Practices
View More Papers
From Observations to Insights: Constructing Effective Cyberattack Provenance with...
Anis Yusof (NU Singapore)
Read MoreUser Comprehension and Comfort with Eye-Tracking and Hand-Tracking Permissions...
Kaiming Cheng (University of Washington), Mattea Sim (Indiana University), Tadayoshi Kohno (University of Washington), Franziska Roesner (University of Washington)
Read MoreCross-Origin Web Attacks via HTTP/2 Server Push and Signed...
Pinji Chen (Tsinghua University), Jianjun Chen (Tsinghua University & Zhongguancun Laboratory), Mingming Zhang (Zhongguancun Laboratory), Qi Wang (Tsinghua University), Yiming Zhang (Tsinghua University), Mingwei Xu (Tsinghua University), Haixin Duan (Tsinghua University)
Read MoreFrom Large to Mammoth: A Comparative Evaluation of Large...
Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)
Read More