Searched for: mods_originInfo_publisher_s%3A%22USENIX%255C%2BAssociation%22
(1 - 19 of 19)
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
Helping hands: Measuring the impact of a large threat intelligence sharing community
Helping hands: Measuring the impact of a large threat intelligence sharing community
Measurement by Proxy: On the Accuracy of Online Marketplace Measurements
Measurement by Proxy: On the Accuracy of Online Marketplace Measurements
An Empirical Study of a Decentralized IdentityWallet
An Empirical Study of a Decentralized IdentityWallet: Usability, Security, and Perspectives on User Control
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
Exploiting Digital Micro-Mirror Devices for Ambient Light Communication
Exploiting Digital Micro-Mirror Devices for Ambient Light Communication
“The thing doesn't have a name”
“The thing doesn't have a name”: Learning from emergent real-world interventions in smart home security
Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection
Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection
Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data
Risky Business? Investigating the Security Practices of Vendors on an Online Anonymous Market using Ground-Truth Data
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting
Fingerprinting tooling used for SSH compromisation attempts
Fingerprinting tooling used for SSH compromisation attempts
Inadvertently making cyber criminals rich
Inadvertently making cyber criminals rich: A comprehensive study of cryptojacking campaigns at internet scale
CSI NN
CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
How Effective is Anti-Phishing Training for Children?
How Effective is Anti-Phishing Training for Children?
Post-mortem of a Zombie: Conficker cleanup after six years
Post-mortem of a Zombie: Conficker cleanup after six years
Internet Measurements and Public Policy: Mind the Gap
Internet Measurements and Public Policy: Mind the Gap
Searched for: mods_originInfo_publisher_s%3A%22USENIX%255C%2BAssociation%22
(1 - 19 of 19)