Konstantin Beznosov
TitleCited byYear
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th annual computer security applications conference, 93-102, 2011
4652011
Does my password go up to eleven?: the impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
1862013
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
ST Sun, K Beznosov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1822012
An integrated view of human, organizational, and technological challenges of IT security management
SM Furnell, N Clarke, R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security, 2009
1722009
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Computer Networks 57 (2), 556-578, 2013
1702013
Towards agile security assurance
K Beznosov, P Kruchten
Proceedings of the 2004 workshop on New security paradigms, 47-54, 2004
1382004
Mastering Web services security
B Hartman, DJ Flinn, K Beznosov, S Kawamoto
John Wiley & Sons, 2003
1372003
Android permissions remystified: A field study on contextual integrity
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
24th {USENIX} Security Symposium ({USENIX} Security 15), 499-514, 2015
1292015
Supporting Relationships in Access Control Using Role Based Access Control.
JF Barkley, K Beznosov, J Uppal
ACM Workshop on Role-Based Access Control, 55-65, 1999
1231999
Efficient authentication and key management mechanisms for smart grid communications
H Nicanfar, P Jokar, K Beznosov, VCM Leung
IEEE systems journal 8 (2), 629-640, 2013
1132013
Preparation, detection, and analysis: the diagnostic work of IT security incident response
SM Furnell, N Clarke, R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security, 2010
1042010
Towards understanding IT security professionals and their tools
D Botta, R Werlinger, A Gagné, K Beznosov, L Iverson, S Fels, B Fisher
Proceedings of the 3rd symposium on Usable privacy and security, 100-111, 2007
1002007
Do windows users follow the principle of least privilege?: investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1, 2010
992010
What makes users refuse web single sign-on?: an empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 4, 2011
952011
Extending XP practices to support security requirements engineering
G Boström, J Wäyrynen, M Bodén, K Beznosov, P Kruchten
Proceedings of the 2006 international workshop on Software engineering for …, 2006
942006
An approach for modeling and analysis of security system architectures
Y Deng, J Wang, JJP Tsai, K Beznosov
IEEE Transactions on knowledge and data engineering 15 (5), 1099-1119, 2003
872003
Understanding users' requirements for data protection in smartphones
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
2012 IEEE 28th International Conference on Data Engineering Workshops, 228-235, 2012
832012
On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 3, 2011
822011
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
NDSS 15, 8-11, 2015
812015
Phishing threat avoidance behaviour: An empirical investigation
NAG Arachchilage, S Love, K Beznosov
Computers in Human Behavior 60, 185-197, 2016
792016
The system can't perform the operation now. Try again later.
Articles 1–20