-
3
-
-
80455144488
-
A survey on saving personal data in the mobile phone
-
Pernul G, et al., editors.
-
Androulidakis I, Kandus G. A survey on saving personal data in the mobile phone. In: Pernul G, et al., editors. Proc. of 6th international conference on availability, reliability and security (ARES-2011). Austria; 2011a. p. 633-8.
-
(2011)
Proc. of 6th International Conference on Availability, Reliability and Security (ARES-2011). Austria
, pp. 633-638
-
-
Androulidakis, I.1
Kandus, G.2
-
5
-
-
84869595483
-
Feeling secure vs. Being secure, the mobile phone user case
-
Proc. of 7th international conference in global security, safety and sustainability (ICGS3-2011) Greece: Springer
-
Androulidakis I, Kandus G. Feeling secure vs. being secure, the mobile phone user case. In: Proc. of 7th international conference in global security, safety and sustainability (ICGS3-2011). Greece: Springer; 2012. p. 212-9. LNCS-99.
-
(2012)
LNCS
, vol.99
, pp. 212-219
-
-
Androulidakis, I.1
Kandus, G.2
-
6
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
USENIX Association
-
Aviv A, Gibson K, Mossop E, Blaze M, Smith J. Smudge attacks on smartphone touch screens. In: Proc. of the 4th USENIX conference on offensive technologies. USENIX Association; 2010. p. 1-7.
-
(2010)
Proc. of the 4th USENIX Conference on Offensive Technologies
, pp. 1-7
-
-
Aviv, A.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.5
-
10
-
-
84941143477
-
-
BSA. Technical Report. 9th ed. Business Software Alliance
-
BSA. BSA global software piracy study: shadow market. Technical Report. 9th ed. Business Software Alliance; 2012.
-
(2012)
BSA Global Software Piracy Study: Shadow Market
-
-
-
12
-
-
0024682488
-
Computational aspects of computer viruses
-
Cohen F. Computational aspects of computer viruses. Computers & Security 1989;8(4):297-8.
-
(1989)
Computers & Security
, vol.8
, Issue.4
, pp. 297-298
-
-
Cohen, F.1
-
15
-
-
34547919197
-
The future of mobile malware
-
Coursen S. The future of mobile malware. Network Security 2007; 2007(8):7-11.
-
(2007)
Network Security
, vol.2007
, Issue.8
, pp. 7-11
-
-
Coursen, S.1
-
16
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
Cronbach L. Coefficient alpha and the internal structure of tests. Psychometrika 1951;16:297-334.
-
(1951)
Psychometrika
, vol.16
, pp. 297-334
-
-
Cronbach, L.1
-
20
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
Enck W, Gilbert P, Chun B, Cox L, Jung J, McDaniel P, et al. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proc. of the 9th USENIX symposium on operating systems design and implementation (OSDI'10). USENIX Association; 2010. p. 1-6.
-
(2010)
Proc. of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10)
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
-
22
-
-
80755187788
-
Android permissions demystified
-
USA: ACM
-
Felt A, Chin E, Hanna S, Song D, Wagner D. Android permissions demystified. In: Proc. of the 18th ACM conference on computer and communications security (CCS '11). USA: ACM; 2011a. p. 627-38.
-
(2011)
Proc. of the 18th ACM Conference on Computer and Communications Security (CCS '11)
, pp. 627-638
-
-
Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
23
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM
-
Felt A, Finifter M, Chin E, Hanna S, Wagner D. A survey of mobile malware in the wild. In: Proc. of the 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM '11). ACM; 2011b. p. 3-14.
-
(2011)
Proc. of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11)
, pp. 3-14
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
24
-
-
85046879731
-
Permissionre-delegation: Attacksanddefenses
-
Felt A, Wang H, Moshchuk A, Hanna S, Chin E, Greenwood K, Wagner D, et al. Permissionre-delegation: attacksanddefenses. In: Proc. of the 20th USENIX security symposium, USA; 2011c.
-
Proc. of the 20th USENIX Security Symposium, USA; 2011
-
-
Felt, A.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
Greenwood, K.6
Wagner, D.7
-
25
-
-
84867463760
-
-
Technical Report UCB/EECS-2012-26; UC Berkeley
-
Felt A, Ha E, Egelman S, Haney A, Chin E, Wagner D. Android permissions: user attention, comprehension, and behavior. Technical Report UCB/EECS-2012-26; UC Berkeley; 2012.
-
(2012)
Android Permissions: User Attention, Comprehension, and Behavior
-
-
Felt, A.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
27
-
-
19944387279
-
Why users cannot use security
-
Furnell S. Why users cannot use security. Computers & Security 2005;24(4):274-9.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 274-279
-
-
Furnell, S.1
-
28
-
-
34547950128
-
Making security usable: Are things improving?
-
Furnell S. Making security usable: are things improving? Computers & Security 2007;26(6):434-43.
-
(2007)
Computers & Security
, vol.26
, Issue.6
, pp. 434-443
-
-
Furnell, S.1
-
29
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Furnell S, Jusoh A, Katsabas D. The challenges of understanding and using security: a survey of end-users. Computers & Security 2006;25(1):27-35.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 27-35
-
-
Furnell, S.1
Jusoh, A.2
Katsabas, D.3
-
32
-
-
0021135218
-
Regression modeling strategies for improved prognostic prediction
-
Harrell F, Lee K, Califf R, Pryor D, Rosati R. Regression modeling strategies for improved prognostic prediction. Statistics in Medicine 1984;3(2):143-52.
-
(1984)
Statistics in Medicine
, vol.3
, Issue.2
, pp. 143-152
-
-
Harrell, F.1
Lee, K.2
Califf, R.3
Pryor, D.4
Rosati, R.5
-
33
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
USA: ACM
-
Hornyack P, Han S, Jung J, Schechter S, Wetherall D. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In: Proc. of the 18th ACM conference on computer and communications security (CCS '11). USA: ACM; 2011. p. 639-52.
-
(2011)
Proc. of the 18th ACM Conference on Computer and Communications Security (CCS '11)
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
36
-
-
84867438639
-
A conundrum of permissions: Installing applications on an android smartphone
-
Kelley P, Consolvo S, Cranor L, Jung J, Sadeh N, Wetherall D. A conundrum of permissions: installing applications on an android smartphone. In: Workshop on usable security (USEC-2012); 2012.
-
(2012)
Workshop on Usable Security (USEC-2012)
-
-
Kelley, P.1
Consolvo, S.2
Cranor, L.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
38
-
-
70349567489
-
Security threats scenarios in trust and reputation models for distributed systems
-
Marmol F, Perez G. Security threats scenarios in trust and reputation models for distributed systems. Computers & Security 2009;28(7):545-56.
-
(2009)
Computers & Security
, vol.28
, Issue.7
, pp. 545-556
-
-
Marmol, F.1
Perez, G.2
-
39
-
-
77958124029
-
Not so great expectations: Why application markets haven't failed security
-
McDaniel P, Enck W. Not so great expectations: why application markets haven't failed security. IEEE Security and Privacy (SP) 2010;8(5):76-8.
-
(2010)
IEEE Security and Privacy (SP)
, vol.8
, Issue.5
, pp. 76-78
-
-
McDaniel, P.1
Enck, W.2
-
40
-
-
0141862713
-
-
Technical Report WP9604. University of Minnesota Information Systems Research Center
-
McKnight DH, Chervany NL. The meanings of trust. Technical Report WP9604. University of Minnesota Information Systems Research Center; 1996.
-
(1996)
The Meanings of Trust
-
-
McKnight, D.H.1
Chervany, N.L.2
-
42
-
-
80052493767
-
Smartphone security evaluation - The malware attack case
-
Samarati P, Lopez J, editors. Spain: SciTePress
-
Mylonas A, Dritsas S, Tsoumas B, Gritzalis D. Smartphone security evaluation - the malware attack case. In: Samarati P, Lopez J, editors. Proc. of the international conference on security and cryptography (SECRYPT'11). Spain: SciTePress; 2011a. p. 25-36.
-
(2011)
Proc. of the International Conference on Security and Cryptography (SECRYPT'11)
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
43
-
-
80052791491
-
A secure smartphone applications roll-out scheme
-
Proc. of the 8th international conference on trust, privacy & security in digital business (TRUST-2011) France: Springer;
-
Mylonas A, Tsoumas B, Dritsas S, Gritzalis D. A secure smartphone applications roll-out scheme. In: Proc. of the 8th international conference on trust, privacy & security in digital business (TRUST-2011). France: Springer; 2011b. p. 49-61. LNCS-6863.
-
(2011)
LNCS
, vol.6863
, pp. 49-61
-
-
Mylonas, A.1
Tsoumas, B.2
Dritsas, S.3
Gritzalis, D.4
-
45
-
-
77956887506
-
A note on a general definition of the coefficient of determination
-
Nagelkerke N. A note on a general definition of the coefficient of determination. Biometrika 1991;78(3):691-2.
-
(1991)
Biometrika
, vol.78
, Issue.3
, pp. 691-692
-
-
Nagelkerke, N.1
-
51
-
-
84926351578
-
Crying wolf: An empirical study of ssl warning effectiveness
-
USA: USE Association
-
Sunshine J, Egelman S, Almuhimedi H, Atri N, Cranor LF. Crying wolf: an empirical study of ssl warning effectiveness. In: Proc. of the 18th USENIX security symposium (SSYM '09). USA: USE Association; 2009. p. 399-416.
-
(2009)
Proc. of the 18th USENIX Security Symposium (SSYM '09)
, pp. 399-416
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
52
-
-
34047196605
-
A Common Body of Knowledge for Information Security
-
Theoharidou M, Gritzalis D. A Common Body of Knowledge for Information Security. IEEE Security & Privacy 2007;5(2):64-7.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.2
, pp. 64-67
-
-
Theoharidou, M.1
Gritzalis, D.2
-
58
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Zhou Y, Wang Z, Zhou W, Jiang X. Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proc. of the 19th network and distributed system security symposium (NDSS '12). USA; 2012b;.
-
Proc. of the 19th Network and Distributed System Security Symposium (NDSS '12). USA; 2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
|