Year |
Citation |
Score |
2018 |
Wolf F, Kuber R, Aviv AJ. An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication Behaviour & Information Technology. 37: 320-334. DOI: 10.1080/0144929X.2018.1436591 |
0.444 |
|
2016 |
Sonchack J, Aviv AJ. Exploring large scale security system reproducibility with the LESS simulator Journal of Computer Security. 24: 645-665. DOI: 10.3233/Jcs-160553 |
0.386 |
|
2015 |
Sonchack J, Aviv AJ, Keller E, Smith JM. OFX: Enabling OpenFlow extensions for switch-level security applications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1678-1680. DOI: 10.1145/2810103.2810120 |
0.445 |
|
2015 |
Sonchack J, Aviv AJ, Smith JM. Cross-domain collaboration for improved IDS rule set selection Journal of Information Security and Applications. 24: 25-40. DOI: 10.1016/j.jisa.2015.10.001 |
0.351 |
|
2014 |
West AG, Aviv AJ. Measuring privacy disclosures in URL query strings Ieee Internet Computing. 18: 52-59. DOI: 10.1109/Mic.2014.104 |
0.406 |
|
2014 |
Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013 |
0.525 |
|
2012 |
Aviv AJ, Sapp B, Blaze M, Smith JM. Practicality of accelerometer side channels on smartphones Acm International Conference Proceeding Series. 41-50. DOI: 10.1145/2420950.2420957 |
0.437 |
|
2012 |
Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11 |
0.507 |
|
2010 |
Reed J, Aviv AJ, Wagner D, Haeberlen A, Pierce BC, Smith JM. Differential privacy for collaborative security Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 1-7. DOI: 10.1145/1752046.1752047 |
0.511 |
|
2009 |
West AG, Aviv AJ, Chang J, Prabhu VS, Blaze M, Kannan S, Lee I, Smith JM, Sokolsky O. QuanTM: A Quantitative Trust Management system Proceedings of the 2nd European Workshop On System Security, Eurosec'09. 28-35. DOI: 10.1145/1519144.1519149 |
0.389 |
|
2007 |
Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30 |
0.543 |
|
Show low-probability matches. |