Biblio

Export 9 results:
Filters: Author is Carl A. Gunter  [Clear All Filters]
2023
Huang H-Y, Demetriou S, Hassan M, Tuncay GSeray, Gunter CA, Bashir M.  2023.  Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). :509--524.
Xu X, Hao Q, Yang Z, Li B, Liebovitz D, Wang G, Gunter CA.  2023.  How to Cover up Anomalous Accesses to Electronic Health Records. 32nd USENIX Security Symposium (USENIX Security 23). :229--246.
2020
Tuncay GSeray, Qian J, Gunter CA.  2020.  See No Evil: Phishing for Permissions with False Transparency. 29th USENIX Security Symposium (USENIX Security 20). :415--432.
2013
Duffy E, Nyemba S, Gunter CA, Liebovitz D, Malin B.  2013.  Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
2011
Green J, Juen J, Fatemieh O, Shankesi R, Jin D, Gunter CA.  2011.  Reconstructing Hash Reversal based Proof of Work Schemes. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
Zhang W, Gunter CA, Liebovitz D, Tian J.  2011.  Role Prediction Using Electronic Medical Record System Audits. 2nd USENIX Workshop on Health Security and Privacy (HealthSec 11).
2010
Khan F, Gunter CA.  2010.  Tiered Incentives for Integrity Based Queuing. 2010 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 10).
1999
Gunter CA.  1999.  Domain-Specific Languages for Programming and Security in Active Networks. 2nd Conference on Domain-Specific Languages (DSL 99).