Konstantin Beznosov
Titel
Geciteerd door
Geciteerd door
Jaar
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th annual computer security applications conference, 93-102, 2011
5302011
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
ST Sun, K Beznosov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2092012
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
2082013
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Computer Networks 57 (2), 556-578, 2013
2062013
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security, 2009
1932009
Android permissions remystified: A field study on contextual integrity
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
24th USENIX Security Symposium (USENIX Security 15), 499-514, 2015
1602015
Towards agile security assurance
K Beznosov, P Kruchten
Proceedings of the 2004 workshop on New security paradigms, 47-54, 2004
1472004
Efficient authentication and key management mechanisms for smart grid communications
H Nicanfar, P Jokar, K Beznosov, VCM Leung
IEEE systems journal 8 (2), 629-640, 2013
1402013
Mastering Web services security
B Hartman, DJ Flinn, K Beznosov, S Kawamoto
John Wiley & Sons, 2003
1372003
Supporting relationships in access control using role based access control
J Barkley, K Beznosov, J Uppal
Proceedings of the fourth ACM workshop on Role-based access control, 55-65, 1999
1261999
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security, 2010
1252010
Towards understanding IT security professionals and their tools
D Botta, R Werlinger, A Gagné, K Beznosov, L Iverson, S Fels, B Fisher
Proceedings of the 3rd symposium on Usable privacy and security, 100-111, 2007
1192007
Phishing threat avoidance behaviour: An empirical investigation
NAG Arachchilage, S Love, K Beznosov
Computers in Human Behavior 60, 185-197, 2016
1172016
Integro: leveraging victim prediction for robust fake account detection in OSNs.
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
Ndss 15, 8-11, 2015
1072015
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
1052011
Extending XP practices to support security requirements engineering
G Boström, J Wäyrynen, M Bodén, K Beznosov, P Kruchten
Proceedings of the 2006 international workshop on Software engineering for …, 2006
1052006
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1032010
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
932011
An approach for modeling and analysis of security system architectures
Y Deng, J Wang, JJP Tsai, K Beznosov
IEEE Transactions on knowledge and data engineering 15 (5), 1099-1119, 2003
932003
Understanding users' requirements for data protection in smartphones
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
2012 IEEE 28th International Conference on Data Engineering Workshops, 228-235, 2012
912012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20