Suivre
Konstantin Beznosov
Titre
Citée par
Citée par
Année
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th annual computer security applications conference, 93-102, 2011
7002011
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Computer Networks 57 (2), 556-578, 2013
3122013
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
2912013
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
ST Sun, K Beznosov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2832012
Android permissions remystified: A field study on contextual integrity
P Wijesekera, A Baokar, A Hosseini, S Egelman, D Wagner, K Beznosov
24th USENIX Security Symposium (USENIX Security 15), 499-514, 2015
2652015
An integrated view of human, organizational, and technological challenges of IT security management
R Werlinger, K Hawkey, K Beznosov
Information Management & Computer Security, 2009
2522009
Phishing threat avoidance behaviour: An empirical investigation
NAG Arachchilage, S Love, K Beznosov
Computers in Human Behavior 60, 185-197, 2016
2392016
Efficient authentication and key management mechanisms for smart grid communications
H Nicanfar, P Jokar, K Beznosov, VCM Leung
IEEE systems journal 8 (2), 629-640, 2013
2192013
Towards agile security assurance
K Beznosov, P Kruchten
Proceedings of the 2004 workshop on New security paradigms, 47-54, 2004
1832004
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
P Wijesekera, A Baokar, L Tsai, J Reardon, S Egelman, D Wagner, ...
2017 IEEE Symposium on Security and Privacy (SP), 1077-1093, 2017
1772017
Integro: Leveraging victim prediction for robust fake account detection in OSNs.
Y Boshmaf, D Logothetis, G Siganos, J Lería, J Lorenzo, M Ripeanu, ...
NDSS 15, 8-11, 2015
1712015
Preparation, detection, and analysis: the diagnostic work of IT security incident response
R Werlinger, K Muldner, K Hawkey, K Beznosov
Information Management & Computer Security, 2010
1652010
Towards understanding IT security professionals and their tools
D Botta, R Werlinger, A Gagné, K Beznosov, L Iverson, S Fels, B Fisher
Proceedings of the 3rd symposium on Usable privacy and security, 100-111, 2007
1592007
Mastering web services security
B Hartman, DJ Flinn, K Beznosov, S Kawamoto
John Wiley & Sons, 2003
1492003
Supporting relationships in access control using role based access control
J Barkley, K Beznosov, J Uppal
Proceedings of the fourth ACM workshop on Role-based access control, 55-65, 1999
1441999
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the seventh symposium on usable privacy and security, 1-20, 2011
1382011
Extending XP practices to support security requirements engineering
G Boström, J Wäyrynen, M Bodén, K Beznosov, P Kruchten
Proceedings of the 2006 international workshop on Software engineering for …, 2006
1372006
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
A Sotirakopoulos, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-18, 2011
1242011
Do Windows users follow the principle of least privilege? Investigating user account control practices
S Motiee, K Hawkey, K Beznosov
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
1232010
Know your enemy: the risk of unauthorized access in smartphones by insiders
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
Proceedings of the 15th international conference on Human-computer …, 2013
1212013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20