Personensuche
X
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
1
Users Really Do Respond To Smishing:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
5
CATCHA: When Cats Track Your Movements Online:
, In:
?
2019 17th International Conference on Privacy, Security and Trust (PST) ,
6
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Co..:
, In:
?
Machine Learning and Knowledge Discovery in Databases; Lecture Notes in Computer Science ,
7
Learning Tensor-Based Representations from Brain-Computer I..:
, In:
?
Proceedings of the 34th Annual Computer Security Applications Conference ,
8
IAC : On the Feasibility of Utilizing Neural Signals for..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
9
Rendered Insecure : GPU Side Channel Attacks are Practic..:
, In:
?
Proceedings of the 34th Annual Computer Security Applications Conference ,
10
Do Social Disorders Facilitate Social Engineering? : A C..:
, In:
?
Proceedings of the 26th International Conference on World Wide Web ,
11
Neural Underpinnings of Website Legitimacy and Familiarity ..:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
12