Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2018When is a Tree Really a Truck? Exploring Mental Models of EncryptionJustin Wu, Daniel Zappala
    SOUPS 2018The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi ArabiansElham Al Qahtani, Mohamed Shehab, Abrar Aljohani
    SOUPS 2018Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled GardensOrçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten
    SOUPS 2018Action Needed! Helping Users Find and Complete the Authentication Ceremony in SignalElham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, Daniel Zappala
    SOUPS 2018User Comfort with Android Background Resource Accesses in Different ContextsDaniel Votipka, Seth M. Rabin, Kristopher Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster
    SOUPS 2018Programming Experience Might Not Help in Comprehending Obfuscated Source Code EfficientlyNorman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix Freiling, Zinaida Benenson
    SOUPS 2017Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk
    SOUPS 2017The Shadow Warriors: In the no man’s land between industrial control systems and enterprise IT systems
    SOUPS 2017Skills and Characteristics of Successful Cybersecurity Advocates
    SOUPS 2017A Proposed Visualization for Vulnerability Scan Data
    SOUPS 2017Ask Me Anything: A Conversational Interface to Augment Information Security Workers
    SOUPS 2017Comparing Educational Approaches to Secure programming: Tool vs. TA
    SOUPS 2017Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities
    SOUPS 2017Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe
    SOUPS 2017Formal Mental Models for Inclusive Privacy and Security
    SOUPS 2017You Want Me To Do What? A Design Study of Two-Factor Authentication Messages
    SOUPS 2017Smartwatches Locking Methods: A Comparative Study
    SOUPS 2017A Gamified Approach to Improve Users’ Memorability of Fall-back Authentication
    SOUPS 2017On the Design of Distributed Adaptive Authentication Systems
    SOUPS 2017Touchscreen Biometrics Across Multiple Devices
    SOUPS 2017Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques
    SOUPS 2017Augmenting Centralized Password Management with Application-Specific Passwords
    SOUPS 2017"I want my money back!" Limiting Online Password-Guessing Financially
    SOUPS 2017Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability MetricsCasey Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas
    SOUPS 2017DigiTally: Piloting Offline Payments for PhonesKhaled Baqer, Ross Anderson, Lorna Mutegi, Jeunese Adrienne Payne, Joseph Sevilla

Pages