Itus: an implicit authentication framework for android H Khan, A Atwater, U Hengartner Proceedings of the 20th Annual International Conference on Mobile Computing …, 2014 | 111 | 2014 |
Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying H Khan, U Hengartner, D Vogel Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 225-239, 2015 | 96 | 2015 |
Towards application-centric implicit authentication on smartphones H Khan, U Hengartner Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014 | 84 | 2014 |
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ... 2012 European Workshop on Software Defined Networking, 79-84, 2012 | 65 | 2012 |
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes H Khan, U Hengartner, D Vogel Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 64 | 2016 |
A comparative evaluation of implicit authentication schemes H Khan, A Atwater, U Hengartner Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 61 | 2014 |
Designing a cluster-based covert channel to evade disk investigation and forensics H Khan, M Javed, SA Khayam, F Mirza Computers & Security 30 (1), 35-49, 2011 | 56 | 2011 |
Evaluating attack and defense strategies for smartphone pin shoulder surfing H Khan, U Hengartner, D Vogel Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018 | 49 | 2018 |
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication H Khan, U Hengartner, D Vogel Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018 | 42 | 2018 |
Automated anomaly detector adaptation using adaptive threshold tuning MQ Ali, E Al-Shaer, H Khan, SA Khayam ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-30, 2013 | 39 | 2013 |
Evaluating authentication options for mobile health applications in younger and older adults K Grindrod, H Khan, U Hengartner, S Ong, AG Logan, D Vogel, R Gebotys, ... PloS one 13 (1), 2018 | 33 | 2018 |
What is the impact of p2p traffic on anomaly detection? IU Haq, S Ali, H Khan, SA Khayam Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 29 | 2010 |
Determining malicious executable distinguishing attributes and low-complexity detection H Khan, F Mirza, SA Khayam Journal in computer virology 7, 95-105, 2011 | 25 | 2011 |
On achieving good operating points on an ROC plane using stochastic anomaly score prediction MQ Ali, H Khan, A Sajjad, SA Khayam Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 18 | 2009 |
Mimicry Attacks on Smartphone Keystroke Authentication H Khan, U Hengartner, D Vogel ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-34, 2020 | 16 | 2020 |
Embedding a covert channel in active network connections H Khan, Y Javed, F Mirza, SA Khayam Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009 | 15 | 2009 |
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel H Khan, M Javed, F Mirza, SA Khayam National University of Science & Technology (NUST), Islamabad 44000, 0 | 15* | |
Chaperone: Real-time locking and loss prevention for smartphones J Chen, U Hengartner, H Khan, M Mannan 29th USENIX Security Symposium (USENIX Security 20), 325-342, 2020 | 11 | 2020 |
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond H Khan, J Ceci, J Stegman, AJ Aviv, R Dara, R Kuber Annual Computer Security Applications Conference, 249-262, 2020 | 10 | 2020 |
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones L Agarwal, H Khan, U Hengartner Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 10 | 2016 |