Users Really Do Respond To Smishing
Md Lutfor Rahman, Daniel Timko, Hamid Wali and Ajaya Neupane.
A User Study of Keystroke Dynamics as Second Factor in Web MFA
Ahmed Wahab, Daqing Hou and Stephanie Schuckers.
(Dataset/Tool) Multi-Modality Mobile Datasets for Behavioral Biometrics Research
Aratrika Ray-Dowling, Ahmed Anu Wahab, Daqing Hou and Stephanie Schuckers.
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds
Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A S M Asadujjaman, Makan Pourzandi and Mourad Debbabi.
CloudShield: Real-time Anomaly Detection in the Cloud
Zecheng He, Guangyuan Hu and Ruby Lee.