Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse (DOI)
Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
Employing attack graphs for intrusion detection (DOI)
Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul Yu
Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension (DOI)
Filipo Sharevski, Paige Treebridge, Jessica Westbrook
Cyber security fear appeals: unexpectedly complicated (DOI)
Karen Renaud, Marc Dupuis
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm (DOI)
Fiona Westin, Sonia Chiasson
FrameProv: towards end-to-end video provenance (DOI)
Mansoor Ahmed-Rengers
Privacy controls for always-listening devices (DOI)
Nathan Malkin, Serge Egelman, David Wagner
Everything-as-a-hack: claims-making for access to digital and social resources (DOI)
Wolter Pieters
Towards models for quantifying the known adversary (DOI)
Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari
Why Jenny can't figure out which of these messages is a covert information operation (DOI)
Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse