The socialbot network: when bots socialize for fame and money Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu Proceedings of the 27th annual computer security applications conference, 93-102, 2011 | 715 | 2011 |
Design and analysis of a social botnet Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu Computer Networks 57 (2), 556-578, 2013 | 324 | 2013 |
Does my password go up to eleven? The impact of password meters on password selection S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013 | 300 | 2013 |
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems ST Sun, K Beznosov Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 293 | 2012 |
Android permissions remystified: A field study on contextual integrity P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov 24th USENIX Security Symposium (USENIX Security 15), 499-514, 2015 | 267 | 2015 |
An integrated view of human, organizational, and technological challenges of IT security management R Werlinger, K Hawkey, K Beznosov Information Management & Computer Security, 2009 | 253 | 2009 |
Phishing threat avoidance behaviour: An empirical investigation NAG Arachchilage, S Love, K Beznosov Computers in Human Behavior 60, 185-197, 2016 | 249 | 2016 |
Efficient authentication and key management mechanisms for smart grid communications H Nicanfar, P Jokar, K Beznosov, VCM Leung IEEE systems journal 8 (2), 629-640, 2013 | 222 | 2013 |
Towards agile security assurance K Beznosov, P Kruchten Proceedings of the 2004 workshop on New security paradigms, 47-54, 2004 | 187 | 2004 |
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ... 2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017 | 182 | 2017 |
Integro: Leveraging victim prediction for robust fake account detection in OSNs. Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ... NDSS 15, 8-11, 2015 | 177 | 2015 |
Preparation, detection, and analysis: the diagnostic work of IT security incident response R Werlinger, K Muldner, K Hawkey, K Beznosov Information Management & Computer Security, 2010 | 168 | 2010 |
Towards understanding IT security professionals and their tools D Botta, R Werlinger, A Gagné, K Beznosov, L Iverson, S Fels, B Fisher Proceedings of the 3rd symposium on Usable privacy and security, 100-111, 2007 | 161 | 2007 |
Mastering web services security B Hartman, DJ Flinn, K Beznosov, S Kawamoto John Wiley & Sons, 2003 | 148 | 2003 |
Supporting relationships in access control using role based access control J Barkley, K Beznosov, J Uppal Proceedings of the fourth ACM workshop on Role-based access control, 55-65, 1999 | 146 | 1999 |
What makes users refuse web single sign-on? An empirical investigation of OpenID ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011 | 141 | 2011 |
Extending XP practices to support security requirements engineering G Boström, J Wäyrynen, M Bodén, K Beznosov, P Kruchten Proceedings of the 2006 international workshop on Software engineering for …, 2006 | 136 | 2006 |
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings A Sotirakopoulos, K Hawkey, K Beznosov Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011 | 130 | 2011 |
Do Windows users follow the principle of least privilege? Investigating user account control practices S Motiee, K Hawkey, K Beznosov Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010 | 125 | 2010 |
Know your enemy: the risk of unauthorized access in smartphones by insiders I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov Proceedings of the 15th international conference on Human-computer …, 2013 | 122 | 2013 |