The Effect of Repeated Login Prompts on Phishing Susceptibility

Snyder P, Reiter MK, Kanich C.  2016.  The Effect of Repeated Login Prompts on Phishing Susceptibility. The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). :13--19.

Kharon Dataset: Android Malware under a Microscope

Kiss N, Lalande J-F, Leslous M, Tong VViet Triem.  2016.  Kharon Dataset: Android Malware under a Microscope. The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016). :1--12.

Automated Bug Removal for {Software-Defined} Networks

Wu Y, Chen A, Haeberlen A, Zhou W, Loo BThau.  2017.  Automated Bug Removal for {Software-Defined} Networks. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :719--733.

Splinter: Practical Private Queries on Public Data

Wang F, Yun C, Goldwasser S, Vaikuntanathan V, Zaharia M.  2017.  Splinter: Practical Private Queries on Public Data. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :299--313.

Pages

Subscribe to USENIX RSS