Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Sadegh Farhang"'
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 4, Iss 14, Pp 1-12 (2018)
Users are often educated to follow advices from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every website. However, user surveys reveal that most users are not wi
Externí odkaz:
https://doaj.org/article/326e22a0c7e141e6b7750ed67b4f4248
Autor:
Md Mazharul Islam, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang
Publikováno v:
2021 IEEE Conference on Communications and Network Security (CNS).
Publikováno v:
KDD
Due to biases introduced by large real-world datasets, deviations of deep learning models from their expected behavior on out-of-distribution test data are worrisome. Especially when data come from imbalanced or heavy-tailed label distributions, or m
Publikováno v:
WWW
Mobile devices encroach on almost every part of our lives, including work and leisure, and contain a wealth of personal and sensitive information. It is, therefore, imperative that these devices uphold high security standards. A key aspect is the sec
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 4, Iss 14, Pp 1-12 (2018)
Users are often educated to follow advices from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every website. However, user surveys reveal that most users are not wi
Publikováno v:
NDSS
Publikováno v:
ACSAC
Software upgrades play a pivotal role in enhancing software performance, and are a critical component of resolving software bugs and patching security issues. However, consumers' eagerness to upgrade to the newest operating system is often tempered a
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
SecureComm
SecureComm
Users are often educated to follow different forms of advice from security experts. For example, using a password manager is considered an effective way to maintain a unique and strong password for every important website. However, user surveys revea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b3c565124a346987952fb4234b72a47
https://doi.org/10.1007/978-3-319-78813-5_35
https://doi.org/10.1007/978-3-319-78813-5_35
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662583869
Financial Cryptography
Financial Cryptography
Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications. However, research has documented how
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::428631e3d4ef1fe8ff6e5c5ad4f2f531
https://doi.org/10.1007/978-3-662-58387-6_7
https://doi.org/10.1007/978-3-662-58387-6_7
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319687100
GameSec
GameSec
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::332165c997fd8748d563a4be9c88698e
https://doi.org/10.1007/978-3-319-68711-7_21
https://doi.org/10.1007/978-3-319-68711-7_21