![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 47 matches
- 2017
- Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl:
Security Developer Studies with GitHub Users: Exploring a Convenience Sample. SOUPS 2017: 81-95 - Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen:
"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. SOUPS 2017: 49-63 - Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla:
DigiTally: Piloting Offline Payments for Phones. SOUPS 2017: 131-143 - Cara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer:
Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. SOUPS 2017: 357-375 - Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft:
Exploring decision making with Android's runtime permission dialogs using in-context surveys. SOUPS 2017: 195-210 - Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. SOUPS 2017: 97-114 - Patricia Arias Cabarcos, Christian Krupitzer:
On the Design of Distributed Adaptive Authentication Systems. SOUPS 2017 - Casey Inez Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas:
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics. SOUPS 2017: 271-284 - Dan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen:
A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing. SOUPS 2017: 115-129 - Heather Crawford, Ebad Ahmadzadeh:
Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics. SOUPS 2017: 163-173 - Bobby Filar, Richard Seymour, Matthew Park:
Ask Me Anything: A Conversational Interface to Augment Information Security Workers. SOUPS 2017 - Kevin Gallagher, Sameer Patil, Nasir D. Memon:
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. SOUPS 2017: 385-398 - Maximilian Golla, Daniel V. Bailey, Markus Dürmuth:
"I want my money back!" Limiting Online Password-Guessing Financially. SOUPS 2017 - Julie M. Haney, Wayne G. Lutters:
Skills and Characteristics of Successful Cybersecurity Advocates. SOUPS 2017 - Ann-Marie Horcher:
Key-bored to Tears: The Usability Cost of Character Authentication on Mobile Devices. SOUPS 2017 - Adam Houser, Matthew L. Bolton:
Formal Mental Models for Inclusive Privacy and Security. SOUPS 2017 - Eunjin Jung, Evelyn Y. Ho:
Inclusive persuasion for security software adoption. SOUPS 2017 - Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger:
How Effective is Anti-Phishing Training for Children? SOUPS 2017: 229-239 - Shrirang Mare, Aditya Vashistha, Richard J. Anderson:
Security and privacy design considerations for low-literate users in developing regions. SOUPS 2017 - Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities. SOUPS 2017 - Arunesh Mathur, Marshini Chetty:
Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates. SOUPS 2017: 175-193 - Peter Mayer, Jan Kirchner, Melanie Volkamer:
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016. SOUPS 2017: 13-28 - Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:
A Gamified Approach to Improve Users' Memorability of Fall-back Authentication. SOUPS 2017 - Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk. SOUPS 2017 - Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh:
Privacy Expectations and Preferences in an IoT World. SOUPS 2017: 399-412 - Toan Nguyen, Nasir D. Memon:
Smartwatches Locking Methods: A Comparative Study. SOUPS 2017 - Tuan Ngyuen, Jonathan Voris:
Touchscreen Biometrics Across Multiple Devices. SOUPS 2017 - James Nicholson, Lynne M. Coventry, Pam Briggs:
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. SOUPS 2017: 285-298 - Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. SOUPS 2017 - Yu Pu, Jens Grossklags:
Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? SOUPS 2017: 339-355
skipping 17 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-02 06:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint