Why phishing still works: user strategies for combating phishing attacks M Alsharnouby, F Alaca, S Chiasson International Journal of Human-Computer Studies 82, 69-82, 2015 | 357 | 2015 |
Device fingerprinting for augmenting web authentication: classification and analysis of methods F Alaca, PC van Oorschot Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 138 | 2016 |
A genetic algorithm based cell switch-off scheme for energy saving in dense cell deployments F Alaca, AB Sediq, H Yanikomeroglu 2012 IEEE Globecom Workshops, 63-68, 2012 | 44 | 2012 |
Comparative analysis and framework evaluating web single sign-on systems F Alaca, PCV Oorschot ACM Computing Surveys (CSUR) 53 (5), 1-34, 2020 | 25 | 2020 |
A Multi-Course Report on the Experience of Unplanned Online Exams LY Zhang, AK Petersen, M Liut, B Simion, F Alaca Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021 | 17 | 2021 |
Aggregate interference distribution from large wireless networks with correlated shadowing: An analytical–numerical–simulation approach SS Szyszkowicz, F Alaca, H Yanikomeroglu, JS Thompson IEEE Transactions on Vehicular Technology 60 (6), 2752-2764, 2011 | 10 | 2011 |
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes F Alaca, ARM Abdou, P Van Oorschot IEEE Transactions on Dependable and Secure Computing, 2019 | 9 | 2019 |
Efficient simulation using shadowing fields of many wireless interferers with correlated shadowing SS Szyszkowicz, F Alaca, H Yanikomeroglu, JS Thompson Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st, 1-5, 2010 | 8 | 2010 |
Strengthening Password-Based Web Authentication Through Multiple Supplementary Mechanisms F Alaca Carleton University, 2018 | 4 | 2018 |
Privacy-Preserving Multi-Party Keyword-Based Classification of Unstructured Text Data I Pépin, F Alaca, F Zulkernine 2024 20th International Conference on Distributed Computing in Smart Systems …, 2024 | 2 | 2024 |
Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck Z Fu, SHH Ding, F Alaca, B Fung, P Charland arXiv preprint arXiv:2307.10631, 2023 | 2 | 2023 |
Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace N Sadman, KA Hasan, E Rashno, F Alaca, Y Tian, F Zulkernine 2023 IEEE Symposium Series on Computational Intelligence (SSCI), 1164-1169, 2023 | 1 | 2023 |
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes A Tam, F Alaca, D Barrera Foundations and Practice of Security: 15th International Symposium, FPS 2022 …, 2023 | | 2023 |