Volgen
Konstantin Beznosov
Titel
Geciteerd door
Geciteerd door
Jaar
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th annual computer security applications conference, 93-102, 2011
7282011
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Computer Networks 57 (2), 556-578, 2013
3372013
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
3072013
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
ST Sun, K Beznosov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3022012
Android permissions remystified: A field study on contextual integrity
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
24th USENIX Security Symposium (USENIX Security 15), 499-514, 2015
2752015
Phishing threat avoidance behaviour: An empirical investigation
NAG Arachchilage, S Love, K Beznosov
Computers in Human Behavior 60, 185-197, 2016
2632016
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security, 2009
2602009
Efficient authentication and key management mechanisms for smart grid communications
H Nicanfar, P Jokar, K Beznosov, VCM Leung
IEEE systems journal 8 (2), 629-640, 2013
2292013
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
1932017
Towards agile security assurance
K Beznosov, P Kruchten
Proceedings of the 2004 workshop on New security paradigms, 47-54, 2004
1932004
Integro: Leveraging victim prediction for robust fake account detection in OSNs.
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
NDSS 15, 8-11, 2015
1802015
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security, 2010
1712010
Towards understanding IT security professionals and their tools
D Botta, R Werlinger, A Gagné, K Beznosov, L Iverson, S Fels, B Fisher
Proceedings of the 3rd symposium on Usable privacy and security, 100-111, 2007
1652007
Mastering web services security
B Hartman, DJ Flinn, K Beznosov, S Kawamoto
John Wiley & Sons, 2003
1502003
Supporting relationships in access control using role based access control
J Barkley, K Beznosov, J Uppal
Proceedings of the fourth ACM workshop on Role-based access control, 55-65, 1999
1461999
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
1422011
Extending XP practices to support security requirements engineering
G Boström, J Wäyrynen, M Bodén, K Beznosov, P Kruchten
Proceedings of the 2006 international workshop on Software engineering for …, 2006
1362006
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
1322011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1262010
Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks
Y Huang, B Obada-Obieh, K Beznosov
Proceedings of the 2020 CHI conference on human factors in computing systems …, 2020
1242020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20