Security

Checking App Behavior Against App Descriptions

Author(s): Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller
Venue: International Conference on Software Engineering
Date: 2014

4
Quality

A Clinical Study of Risk Factors Related to Malware Infections

Author(s): Fanny Lalonde Lévesque, Jude Nsiempba, José M. Fernandez, Sonia Chiasson, Anil Somayaji
Venue: International Conference on Software Engineering
Date: November 2013

4
Quality

Mining Apps for Abnormal Usage of Sensitive Data

Author(s): Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden
Venue: IEEE International Conference on Software Engineering
Date: 2015

4
Quality

Behind an Application Firewall, Are We Safe from SQL Injection Attacks?

Author(s): Dennis Appelt, Cu D. Nguyen, Lionel Briand
Venue: 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)
Date: 2015

4
Quality

Power Strips, Prophylactics, and Privacy, Oh My!

Author(s): Julia Gideon, Serge Egelman, Lorrie Cranor, Alessandro Acquisti
Venue: ACM International Conference Proceeding of the second symposium on Usable privacy and security
Date: 2006

3
Quality

Gathering evidence: use of visual security cues in web browsers

Author(s): Tara Whalen, Kori M. Inkpen
Venue: ACM International Conference Proceeding ACM International Conference Proceeding
Date: 2005

3
Quality

Do Security Toolbars Actually Prevent Phishing Attacks

Author(s): Min Wu, Robert C. Miller, Simson L. Garfinkel
Venue: Conference on Human Factors in Computing Systems archive
Date: 2006

3
Quality

A comparison of perceived and real shoulder-surfing risks between

Author(s): Furkan Tari, A. Ant Ozok, Stephen H. Holden
Venue: ACM International Conference Proceeding of the second symposium on Usable privacy and security table of contents
Date: 2006

3
Quality

Web wallet: preventing phishing attacks by revealing user intentions

Author(s): Min Wu, Robert C. Miller, Greg Little
Venue: ACM International Conference Proceeding of the second symposium on Usable privacy and security
Date: 2006

3
Quality

Layered Security Architecture for Threat Management using Multi-Agent System

Author(s): Vandana Gandotra, Archana Archana Singhal, Punam Bedi
Venue: ACM SIGSOFT Software Engineering Notes
Date: September 2011

3
Quality