Ildar Muslukhov
Title
Cited by
Cited by
Year
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th Annual Computer Security Applications Conference, 93-102, 2011
5192011
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
2042013
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Computer Networks 57 (2), 556-578, 2013
2002013
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
1032011
Understanding Users’ Requirements for Data Protection in Smartphones
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
ICDE Workshop, 8, 2012
912012
Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
15th International Conference on Human-Computer Interaction with Mobile …, 2013
832013
Key challenges in defending against malicious socialbots
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Presented as part of the 5th {USENIX} Workshop on Large-Scale Exploits and …, 2012
602012
On the Impact of Touch {ID} on iPhone Passcodes
I Cherapau, I Muslukhov, N Asanka, K Beznosov
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 257-276, 2015
572015
Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
ACM Transactions on Internet Technology (TOIT) 13 (1), 1-35, 2013
292013
Snooping on mobile phones: Prevalence and trends
D Marques, I Muslukhov, T Guerreiro, L Carriço, K Beznosov
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 159-174, 2016
262016
Android users in the wild: Their authentication and usage behavior
A Mahfouz, I Muslukhov, K Beznosov
Pervasive and Mobile Computing 32, 50-61, 2016
162016
Source attribution of cryptographic API misuse in android applications
I Muslukhov, Y Boshmaf, K Beznosov
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
102018
Survey: Data protection in smartphones against physical threats
I Muslukhov
Term Project Papers on Mobile Security. University of British Columbia, 2012
92012
OpenID-enabled browser: towards usable and secure web single sign-on
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
CHI'11 Extended Abstracts on Human Factors in Computing Systems, 1291-1296, 2011
92011
Бортовые алгоритмы контроля параметров ГТД на основе технологии нейронных сетей
ВИ Васильев, СВ Жернаков, ИИ Муслухов
Вестник Уфимского государственного авиационного технического университета 12 (1), 2009
92009
Method and system for decoupling user authentication and data encryption on mobile devices
H Khosravi, I Muslukhov, P Luong, FPSS Inc.
US Patent US20140321641 A1, 2013
72013
Decoupling data-at-rest encryption and smartphone locking with wearable devices
I Muslukhov, ST Sun, P Wijesekera, Y Boshmaf, K Beznosov
Pervasive and Mobile Computing 32, 26-34, 2016
52016
Towards Understanding the Link Between Age and Smartphone Authentication
L Qiu, A De Luca, I Muslukhov, K Beznosov
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
42019
Задача контроля информационных каналов авиационного ГТД в бортовых условиях
СВ Жернаков
Вестник Самарского государственного аэрокосмического университета им …, 2006
42006
EXT4 Encryption Design Document (public version)
M Halcrow, U Savagaonkar, T Ts’o, I Muslukhov
Google Technical Report, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20