Felt, Adrienne Porter
26  Ergebnisse:
Personensuche X
?
1

Web feature deprecation : a case study for chrome:

, In: Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice,
Mirian, Ariana ; Bhagat, Nikunj ; Sadowski, Caitlin... - p. 302-311 , 2019
 
?
2

An Experience Sampling Study of User Reactions to Browser W..:

, In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems,
 
?
3

Where the Wild Warnings Are : Root Causes of Chrome HTTP..:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
 
?
4

Improving SSL Warnings : Comprehension and Adherence:

, In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems,
 
?
5

Experimenting at scale with google chrome's SSL warning:

, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
 
?
7

Measuring user confidence in smartphone security and privac:

, In: Proceedings of the Eighth Symposium on Usable Privacy and Security,
 
?
8

I've got 99 problems, but vibration ain't one : a survey..:

, In: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices,
 
?
9

AdDroid : privilege separation for applications and adve..:

, In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security,
 
?
10

Session details: Attacks and defenses:

, In: Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices,
 
?
11

Android permissions : user attention, comprehension, and..:

, In: Proceedings of the Eighth Symposium on Usable Privacy and Security,
 
?
12

A survey of mobile malware in the wild:

, In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices,
 
?
13

Analyzing inter-application communication in Android:

, In: Proceedings of the 9th international conference on Mobile systems, applications, and services,
 
?
14

Diesel : applying privilege separation to database acces:

, In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security,
 
?
15

Android permissions demystified:

, In: Proceedings of the 18th ACM conference on Computer and communications security,
Felt, Adrienne Porter ; Chin, Erika ; Hanna, Steve.. - p. 627-638 , 2011
 
1-15