Papers

Search results

    ConferenceTitleAuthor(s)
    LEET '08The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffChris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage
    LEET '08Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareMichalis Polychronakis, Panayiotis Mavrommatis
    WOWCS '08WOWCS Scribe NotesColin Dixon, Fred Douglis, Geoff Kuenning, Jane-Ellen Long, Jeffrey C. Mogul
    WOWCS '08Best Practices for the Care and Feeding of a Program Committee, and Other Thoughts on Conference OrganizationFred Douglis
    WOWCS '08What Ought a Program Committee to Do?Mark Allman
    WOWCS '08Program Committee Meetings Considered HarmfulRobbert van Renesse
    WOWCS '08Paper Rating vs. Paper RankingJohn R. Douceur
    WOWCS '08Overcoming Challenges of Maturity Ken Birman
    WOWCS '08Thoughts on Improving Review QualityPaul Francis
    WOWCS '08Scaling Internet Research Publication Processes to Internet ScaleJon Crowcroft, S. Keshav, Nick McKeown
    WOWCS '08Towards a Model of Computer Systems ResearchThomas Anderson
    WOWCS '08Banal: Because Format Checking Is So TriteGeoffrey M. Voelker
    WOWCS '08Hot Crap!Eddie Kohler
    WOWCS '08Moderated Discussion on Concrete Things We Can Do
    UPSEC '08A Framework for Reasoning About the Human in the LoopLorrie Faith Cranor
    UPSEC '08Understanding Privacy Settings in Facebook with an Audience ViewHeather Richter Lipford, Andrew Besmer, Jason Watson
    UPSEC '08Where's The Beep? Security, Privacy, and User Misunderstandings of RFIDJennifer King, Andrew McDiarmid
    UPSEC '08Biometric Daemons: Authentication via Electronic PetsPam Briggs, Patrick Olivier
    UPSEC '08Freezing More Than Bits: Chilling Effects of the OLPC XO Security ModelMeredith L. Patterson, Len Sassaman, David Chaum
    UPSEC '08Centered Discretization with Application to Graphical PasswordsSonia Chiasson, Jayakumar Srinivasan, Robert Biddle, P.C. van Oorschot
    UPSEC '08Using Salience Differentials to Making Visual Cues NoticeableAndreas Heiner, N. Asokan
    UPSEC '08Predicted and Observed User Behavior in the Weakest-link Security GameJens Grossklags, Nicolas Christin, John Chuang
    UPSEC '08Ad-hoc Guesting: When Exceptions Are the RuleBrinda Dalal, Les Nelson, Diana Smetters, Nathaniel Good, Ame Elliot
    UPSEC '08iPhish: Phishing Vulnerabilities on Consumer ElectronicsYuan Niu, Francis Hsu, Hao Chen
    UPSEC '08RUST: A Retargetable Usability Testbed for Web Site Authentication TechnologiesMaritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Gail E. Kaiser

    Pages