Security

Behind an Application Firewall, Are We Safe from SQL Injection Attacks?

Author(s): Dennis Appelts, Cu D. Nguyen, Lionel Briand
Venue: International Conference on Software Testing
Date: 2015

4
Quality

Vulnerability detection in recent Android apps: An empirical study

Author(s): Faysal Hossain Shezan, Syeda Farzia Afroze & Anindya Iqbal
Venue: 2017 International Conference on Networking, Systems and Security (NSysS)
Date: 5-8 Jan. 2017

4
Quality

Measuring subversions: security and legal risk in reused software artifacts

Author(s): Julius Davies
Venue: 33rd International Conference on Software Engineering (ICSE), 2011
Date: 21-28 May 2011

4
Quality

Checking App Behavior Against App Descriptions

Author(s): Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller
Venue: International Conference on Software Engineering
Date: 2014

4
Quality

Password Security: An Empirical Study

Author(s): Moshe Zviran; William J Haga
Venue: Journal of Management Information Systems
Date: Spring 1999

3
Quality

USEable Security: Interface Design Strategies for Improving Security

Author(s): Amanda L. Stephano, Dennis P. Groth
Venue: 3rd International Workshop on Visualization for Computer Security
Date: 2006

3
Quality

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps

Author(s): Li Li, Alexandre Bartel, Tegawende F. Bissyand, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick McDaniel
Venue: IEEE International Conference on Software Engineering
Date: 2015

3
Quality

Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection

Author(s): Ramona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey
Venue: Conference on Human Factors in Computing Systems
Date: 2007

3
Quality

Users’ Conceptions of Web Security:A Comparative Study

Author(s): Batya Friedman, David Hurley, Daniel C. Howe, Edward Felten, Helen Nissenbaum
Venue: Conference on Human Factors in Computing Systems
Date: 2002

3
Quality

Why Johnny Can’t Encrypt:A Usability Evaluation of PGP 5.0

Author(s): Alma Whitten, J. D. Tygar
Venue: Proceedings of the 8th conference on USENIX Security Symposium
Date: 1999

3
Quality