default search action
Lydia Kraus
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2017
- [b1]Lydia Kraus:
User experience with mobile security and privacy mechanisms. Technical University of Berlin, Germany, 2017
Journal Articles
- 2022
- [j4]Vashek Matyas, Kamil Malinka, Lydia Kraus, Lenka Knapova, Agata Kruzikova:
Even if users do not read security directives, their behavior is not so catastrophic. Commun. ACM 65(1): 37-40 (2022) - [j3]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus:
Applications of educational data mining and learning analytics on data from cybersecurity training. Educ. Inf. Technol. 27(9): 12179-12212 (2022) - 2020
- [j2]Martin Ukrop, Lydia Kraus, Vashek Matyas:
Will You Trust This TLS Certificate?: Perceptions of People Working in IT (Extended Version). DTRAP 1(4): 25:1-25:29 (2020) - 2017
- [j1]Lydia Kraus, Ina Wechsung, Sebastian Möller:
Psychological needs as motivators for security and privacy actions on smartphones. J. Inf. Secur. Appl. 34: 34-45 (2017)
Conference and Workshop Papers
- 2024
- [c13]Paola Marmorato, Clarissa Fernandes, Lydia Kraus, Elizabeth Stobert:
"I'm not planning on dying anytime soon!": A Survey of Digital Legacy Planning. HCI (45) 2024: 64-76 - 2023
- [c12]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. ITiCSE (1) 2023: 236-242 - 2022
- [c11]Lydia Kraus, Matej Grabovský, Martin Ukrop, Katarína Galanská, Vashek Matyás:
Usability Insights from Establishing TLS Connections. SEC 2022: 289-305 - 2021
- [c10]Lydia Kraus, Mária Svidronová, Elizabeth Stobert:
How Do Users Chain Email Accounts Together? SEC 2021: 416-429 - 2019
- [c9]Martin Ukrop, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh:
Will you trust this TLS certificate?: perceptions of people working in IT. ACSAC 2019: 718-731 - [c8]Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig:
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. Security Protocols Workshop 2019: 267-280 - [c7]Lydia Kraus:
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). Security Protocols Workshop 2019: 281-288 - 2017
- [c6]Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Sebastian Möller:
On the Use of Emojis in Mobile Authentication. SEC 2017: 265-280 - 2016
- [c5]Lydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Christopher Krügelstein, Sebastian Möller:
Implications of the Use of Emojis in Mobile Authentication. WAY@SOUPS 2016 - 2014
- [c4]Lydia Kraus, Ina Wechsung, Sebastian Möller:
Using Statistical Information to Communicate Android Permission Risks to Users. STAST 2014: 48-55 - 2012
- [c3]Valentina Janev, Vuk Mijovic, Nikola Tomasevic, Lydia Kraus, Sanja Vranes:
Dynamic Workflows for Airport Emergency Management Training. DEXA Workshops 2012: 5-9 - 2011
- [c2]Sanja Vranes, Mladen Stanojevic, Valentina Janev, Vuk Mijovic, Nikola Tomasevic, Lydia Kraus, Zoran V. Ilic:
Application of Complex Event Processing Paradigm in Situation Awareness and Management. DEXA Workshops 2011: 289-293 - [c1]Lydia Kraus, Mladen Stanojevic, Nikola Tomasevic, Vuk Mijovic:
A Decision Support System for Building Evacuation Based on the EMILI SITE Environment. WETICE 2011: 334-336
Informal and Other Publications
- 2023
- [i3]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. CoRR abs/2307.07608 (2023) - [i2]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus:
Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. CoRR abs/2307.08582 (2023) - 2022
- [i1]Martin Ukrop, Lydia Kraus, Vashek Matyas:
Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). CoRR abs/2207.11610 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint