Cited By
View all- Khern-am-nuai WHashim MPinsonneault AYang WLi N(2023)Augmenting Password Strength Meter Design Using the Elaboration Likelihood ModelInformation Systems Research10.1287/isre.2022.112534:1(157-177)Online publication date: 1-Mar-2023
- Mahdad ASaxena NBoureanu ISchneider SReaves BTippenhauer N(2023)SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User TerminalProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590183(175-186)Online publication date: 29-May-2023
- Zafar H(2022)Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare SettingInternational Journal of Systems and Software Security and Protection10.4018/IJSSSP.31576613:1(1-20)Online publication date: 30-Dec-2022
- Show More Cited By