Su Mon Kywe
Su Mon Kywe
Assistant Manager (Information Security)
Email verificata su singaporeair.com.sg
Titolo
Citata da
Citata da
Anno
On Recommending Hashtags in Twitter Networks
SM Kywe, TA Hoang, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
1782012
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
1142015
A Survey of Recommender Systems in Twitter
SM Kywe, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
962012
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
International Conference on Applied Cryptography and Network Security, 272-289, 2013
322013
Detecting camouflaged applications on mobile application markets
SM Kywe, Y Li, RH Deng, J Hong
International Conference on Information Security and Cryptology, 241-254, 2014
172014
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 147-156, 2016
142016
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
142012
Batch Clone Detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
92014
Poster: Usability Analysis of Biometric Authentication Systems on Mobile Phones
K Iacovino, SM Kywe, LF Cranor, B Ur
8*
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
72014
Security Issues of In-Store Mobile Payment
X Yu, SM Kywe, Y Li
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2, 115-144, 2017
62017
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service
SM Kywe, Y Li, J Shi
RFID-Technologies and Applications (RFID-TA), 2013 IEEE International …, 2013
52013
Dissecting developer policy violating apps: characterization and detection
SM Kywe, Y Li, J Hong, C Yao
Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016
32016
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
MK SU
Singapore Management University, 2016
2016
ENVIRONMENTAL MANAGEMENT STUDY IN CENTRAL MYANMAR
S Wynn, SM Kywe, W Maung
Selected Student Research Projects of the 5th Search for SEAMEO Young …, 0
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–15