Segui
Reham Mohamed
Titolo
Citata da
Citata da
Anno
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th conference on security and privacy in wireless and …, 2019
1282019
The aftermath of a crypto-ransomware attack at a large academic institution
L Zhang-Kennedy, H Assal, J Rocheleau, R Mohamed, K Baig, ...
27th USENIX Security Symposium (USENIX Security 18), 1061-1078, 2018
332018
" I'm hoping they're an ethical company that won't do anything that I'll regret" Users Perceptions of At-home DNA Testing Companies
K Baig, R Mohamed, AL Theus, S Chiasson
Proceedings of the 2020 CHI conference on human factors in computing systems …, 2020
172020
Online privacy and aging of digital artifacts
RE Mohamed, S Chiasson
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 177-195, 2018
122018
A framework for emergency-evacuation planning using GIS and DSS
RE Mohamed, E Kosba, K Mahar, S Mesbah
Information Fusion and Intelligent Geographic Information Systems (IF&IGIS …, 2018
122018
When private and professional lives meet: The impact of digital footprints on employees and political candidates
RE Mohamed, TB Idalino, S Chiasson
Proceedings of the 8th International Conference on Social Media & Society, 1-5, 2017
72017
{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks
P Rieger, M Chilese, R Mohamed, M Miettinen, H Fereidooni, AR Sadeghi
32nd USENIX Security Symposium (USENIX Security 23), 4301-4318, 2023
62023
The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions
R Mohamed, P Chametka, S Chiasson
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
52020
{LocIn}: Inferring Semantic Location from Spatial Maps in Mixed Reality
H Farrukh, R Mohamed, A Nare, A Bianchi, ZB Celik
32nd USENIX Security Symposium (USENIX Security 23), 877-894, 2023
42023
HONEYSCOPE: IoT device protection with deceptive network views
R Mohamed, T O’Connor, M Miettinen, W Enck, AR Sadeghi
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
42019
Istelan: Disclosing sensitive user information by mobile magnetometer from finger touches
R Mohamed, H Farrukh, Y Lu, H Wang, ZB Celik
Proceedings on Privacy Enhancing Technologies, 2023
32023
A GIS-based DSS for evacuation planning
R Ebada, S Mesbah, E Kosba, K Mahar
2012 22nd International Conference on Computer Theory and Applications …, 2012
32012
Investigating Decay Representations for Privacy and Online Reputation Management
R Mohamed
Carleton University, 2019
2019
ATTention Please! An Investigation of the App Tracking Transparency Permission
R Mohamed, A Arunasalam, H Farrukh, J Tong, A Bianchi, ZB Celik
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–14