Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 15
1.
  • Design and analysis of a so... Design and analysis of a social botnet
    Boshmaf, Yazan; Muslukhov, Ildar; Beznosov, Konstantin ... Computer networks, 02/2013, Letnik: 57, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Online Social Networks (OSNs) have attracted millions of active users and have become an integral part of today’s web ecosystem. Unfortunately, in the wrong hands, OSNs can be used to harvest private ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
2.
  • Android users in the wild: ... Android users in the wild: Their authentication and usage behavior
    Mahfouz, Ahmed; Muslukhov, Ildar; Beznosov, Konstantin Pervasive and mobile computing, October 2016, 2016-10-00, Letnik: 32
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we performed a longitudinal field study with 41 participants, who installed our monitoring framework on their Android smartphones and ran it for at least 20 days. We examined how ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
3.
  • Decoupling data-at-rest enc... Decoupling data-at-rest encryption and smartphone locking with wearable devices
    Muslukhov, Ildar; Sun, San-Tsai; Wijesekera, Primal ... Pervasive and mobile computing, October 2016, 2016-10-00, Letnik: 32
    Journal Article
    Recenzirano
    Odprti dostop

    Smartphones store sensitive and confidential data, e.g., business related documents or emails. If a smartphone is stolen, such data are at risk of disclosure. To mitigate this risk, modern ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
4.
  • Design and analysis of a so... Design and analysis of a social botnet
    BOSHMAF, Yazan; MUSLUKHOV, Ildar; BEZNOSOV, Konstantin ... Computer networks (Amsterdam, Netherlands : 1999), 2013, Letnik: 57, Številka: 2
    Journal Article
    Recenzirano
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
5.
  • The socialbot network The socialbot network
    Boshmaf, Yazan; Muslukhov, Ildar; Beznosov, Konstantin ... Proceedings of the 27th Annual Computer Security Applications Conference, 12/2011
    Conference Proceeding

    Online Social Networks (OSNs) have become an integral part of today's Web. Politicians, celebrities, revolutionists, and others use OSNs as a podium to deliver their message to millions of active web ...
Celotno besedilo
Dostopno za: NUK, UL
6.
  • Investigating Users' Perspe... Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
    SUN, San-Tsai; POSPISIL, Eric; MUSLUKHOV, Ildar ... ACM transactions on Internet technology, 11/2013, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano

    OpenID and OAuth are open and simple Web SSO protocols that have been adopted by major service providers, and millions of supporting Web sites. However, the average user’s perception of Web SSO is ...
Celotno besedilo
Dostopno za: NUK, UL
7.
  • Does my password go up to e... Does my password go up to eleven?
    Egelman, Serge; Sotirakopoulos, Andreas; Muslukhov, Ildar ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 04/2013
    Conference Proceeding

    Password meters tell users whether their passwords are "weak" or "strong." We performed a laboratory experiment to examine whether these meters influenced users' password selections when they were ...
Celotno besedilo
Dostopno za: NUK, UL
8.
  • Investigating Usersa Perspe... Investigating Usersa Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
    Sun, San-Tsai; Pospisil, Eric; Muslukhov, Ildar ... ACM transactions on Internet technology, 11/2013, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano

    OpenID and OAuth are open and simple Web SSO protocols that have been adopted by major service providers, and millions of supporting Web sites. However, the average useras perception of Web SSO is ...
Celotno besedilo
Dostopno za: NUK, UL
9.
  • Source Attribution of Crypt... Source Attribution of Cryptographic API Misuse in Android Applications
    Muslukhov, Ildar; Boshmaf, Yazan; Beznosov, Konstantin Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 05/2018
    Conference Proceeding
    Odprti dostop

    Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at least one mistake, which results in an insecure implementation. It is unclear, however, if these ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
10.
  • Towards Understanding the L... Towards Understanding the Link Between Age and Smartphone Authentication
    Qiu, Lina; De Luca, Alexander; Muslukhov, Ildar ... Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 05/2019
    Conference Proceeding
    Odprti dostop

    While previous work on smartphone (un)locking has revealed real world usage patterns, several aspects still need to be explored. In this paper, we fill one of these knowledge gaps: the interplay ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
1 2
zadetkov: 15

Nalaganje filtrov