default search action
Joseph Hallett
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Andy Baldrian, Joseph Hallett:
RTFM: How Hard are IoT Platform Providers Making it for their Developers? CPSIOTSEC@CCS 2024: 14-26 - [c10]Llewellyn Forward, Io Limmer, Joseph Hallett, Dan Page:
Super Mario in the Pernicious Kingdoms Classifying Glitches in Old Games. GAS 2024: 36-43 - [c9]Maysara Alhindi, Joseph Hallett:
Sandboxing Adoption in Open Source Ecosystems. SESoS@ICSE 2024: 13-20 - [i9]Llewellyn Forward, Io Limmer, Joseph Hallett, Dan Page:
Super Mario in the Pernicious Kingdoms: Classifying glitches in old games. CoRR abs/2404.14870 (2024) - [i8]Maysara Alhindi, Joseph Hallett:
Sandboxing Adoption in Open Source Ecosystems. CoRR abs/2405.06447 (2024) - [i7]Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Saltzer & Schroeder for 2030: Security engineering principles in a world of AI. CoRR abs/2407.05710 (2024) - [i6]Andrew Baldrian, Joseph Hallett:
RTFM: How hard are IoT platform providers making it for their developers? CoRR abs/2409.02735 (2024) - 2023
- [j6]Nikhil Patnaik, Andrew Carl Dwyer, Joseph Hallett, Awais Rashid:
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations. ACM Trans. Softw. Eng. Methodol. 32(3): 60:1-60:31 (2023) - [i5]Benjamin Shreeve, Joseph Gardiner, Joseph Hallett, David Humphries, Awais Rashid:
Decisions & Disruptions 2: Decide Harder. CoRR abs/2306.12168 (2023) - 2022
- [j5]Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. IEEE Secur. Priv. 20(1): 87-95 (2022) - [j4]Dirk van der Linden, Emma J. Williams, Joseph Hallett, Awais Rashid:
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers. IEEE Trans. Software Eng. 48(2): 364-376 (2022) - [j3]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups. IEEE Trans. Software Eng. 48(5): 1515-1528 (2022) - [c8]Joseph Hallett, Simon N. Foley, David Manda, Joseph Gardiner, Dimitri Jonckers, Wouter Joosen, Awais Rashid:
Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. CRITIS 2022: 9-26 - [i4]Andrew C. Dwyer, Joseph Hallett, Claudia Peersman, Matthew Edwards, Brittany I. Davidson, Awais Rashid:
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces. CoRR abs/2203.08557 (2022) - 2021
- [c7]Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? ICSE 2021: 486-498 - [c6]Partha Das Chowdhury, Joseph Hallett, Nikhil Patnaik, Mohammad Tahaei, Awais Rashid:
Developers Are Neither Enemies Nor Users: They Are Collaborators. SecDev 2021: 47-55 - [i3]Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? CoRR abs/2102.09790 (2021) - [i2]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Kopo M. Ramokapane, Richard Atkins, Awais Rashid:
The best laid plans or lack thereof: Security decision-making of different stakeholder groups. CoRR abs/2104.00284 (2021) - [i1]Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid:
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations. CoRR abs/2105.02031 (2021) - 2020
- [j2]Denny Pencheva, Joseph Hallett, Awais Rashid:
Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. IEEE Secur. Priv. 18(2): 68-74 (2020) - [j1]Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Pauline Anthonysamy, Sylvain Frey, Awais Rashid:
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making. ACM Trans. Priv. Secur. 24(1): 5:1-5:29 (2020) - [d1]Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid:
SLR_Dataset. IEEE DataPort, 2020
2010 – 2019
- 2019
- [c5]Nikhil Patnaik, Joseph Hallett, Awais Rashid:
Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries. SOUPS @ USENIX Security Symposium 2019 - 2018
- [b1]Joseph Hallett:
Capturing mobile security policies precisely. University of Edinburgh, UK, 2018 - [c4]Joseph Hallett, Robert Larson, Awais Rashid:
Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks. ASE @ USENIX Security Symposium 2018 - 2017
- [c3]Joseph Hallett, David Aspinall:
Capturing Policies for BYOD. SEC 2017: 310-323 - 2016
- [c2]Joseph Hallett, David Aspinall:
AppPAL for Android - Capturing and Checking Mobile App Policies. ESSoS 2016: 216-232 - 2014
- [c1]Joseph Hallett, David Aspinall:
Towards an Authorization Framework for App Security Checking. ESSoS Doctoral Symposium 2014
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint