Security in the Software Development Lifecycle H Assal, S Chiasson Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 281-296, 2018 | 197 | 2018 |
'Think secure from the beginning': A Survey with Software Developers H Assal, S Chiasson Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 170 | 2019 |
The aftermath of a crypto-ransomware attack at a large academic institution L Zhang-Kennedy, H Assal, J Rocheleau, R Mohamed, K Baig, ... 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018 | 34 | 2018 |
Cesar: Visual representation of source code vulnerabilities H Assal, S Chiasson, R Biddle 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016 | 32 | 2016 |
An exploration of graphical password authentication for children H Assal, A Imran, S Chiasson International Journal of Child-Computer Interaction, 2018 | 31 | 2018 |
An Exploration of Graphical Password Authentication for Children SC Hala Assal, Ahsan Imran International Journal of Child-Computer Interaction, 2018 | 31 | 2018 |
Is Real-time Phishing Eliminated with {FIDO}? Social Engineering Downgrade Attacks against {FIDO} Protocols E Ulqinaku, H Assal, AR Abdou, S Chiasson, S Capkun 30th {USENIX} Security Symposium ({USENIX} Security 21), 3811-3828, 2021 | 29* | 2021 |
Motivations and amotivations for software security H Assal, S Chiasson SOUPS Workshop on Security Information Workers (WSIW). USENIX Association, 1-4, 2018 | 29 | 2018 |
What's the deal with privacy apps?: a comprehensive exploration of user perception and usability H Assal, S Hurtado, A Imran, S Chiasson Proceedings of the 14th International Conference on Mobile and Ubiquitous …, 2015 | 29 | 2015 |
Protecting the privacy of technology users who have cognitive disabilities: Identifying areas for improvement and targets for change V Cobigo, K Czechowski, H Chalghoumi, A Gauthier-Beaupre, H Assal, ... Journal of Rehabilitation and Assistive Technologies Engineering 7 …, 2020 | 6 | 2020 |
The Human Dimension of Software Security and Factors Affecting Security Processes H Assal Carleton University, 2018 | 4 | 2018 |
Cross-national privacy concerns on data collection by government agencies R Cooper, H Assal, S Chiasson Proceedings of the 15th International Conference on Privacy, Security and …, 2017 | 4* | 2017 |
Collaborative security code review H Assal Proceedings of the 14th International Conference on Mobile and Ubiquitous …, 2015 | 4 | 2015 |
Will this onion make you cry? A Usability Study of Tor-enabled Mobile Apps H Assal, S Chiasson Symposium On Usable Privacy and Security (SOUPS), 2014 | 4 | 2014 |
“I didn’t even want to turn my head because I was so scared of the prof.”: Student Perceptions of e-Proctoring Software K Chaudhry, A Mann, H Assal, S Chiasson | 3 | 2022 |
Why do Internet Devices Remain Vulnerable? A Survey with System Administrators T Bondar, H Assal, AR Abdou | 2 | 2023 |
“It's not that I want to see the student's bedroom...”: Instructor Perceptions of e-Proctoring Software K Chaudhry, AL Theus, H Assal, S Chiasson Proceedings of the 2023 European Symposium on Usable Security, 15-26, 2023 | | 2023 |
Preliminary work on the Opinions on and Acceptance of Obscure Biometrics: Odor, Gait and Ear Shape C Karanassios, H Assal | | 2022 |
“Lose Your Phone, Lose Your Identity”: Exploring Users’ Perceptions and Expectations of a Digital Identity Service M Lutaaya, H Assal, K Baig, S Maqsood, S Chiasson | | 2021 |
Collaborative Security Code-Review: Towards Aiding Developers Ensure Software-Security H Assal, J Wilson, S Chiasson, R Biddle Symposium On Usable Privacy and Security (SOUPS), 2015 | | 2015 |