default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2024
- Jan-Philip van Acken, Floris Jansen, Slinger Jansen, Katsiaryna Labunets:
Who is the IT Department Anyway: An Evaluative Case Study of Shadow IT Mindsets Among Corporate Employees. SOUPS @ USENIX Security Symposium 2024: 527-545 - Sarah A. Alromaih, Ivan Flechais, George Chalhoub:
Beyond the Office Walls: Understanding Security and Shadow Security Behaviours in a Remote Work Context. SOUPS @ USENIX Security Symposium 2024: 507-525 - David G. Balash, Mir Masood Ali, Chris Kanich, Adam J. Aviv:
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps. SOUPS @ USENIX Security Symposium 2024: 413-432 - Thomas Baumer, Tobias Reittinger, Sascha Kern, Günther Pernul:
Digital Nudges for Access Reviews: Guiding Deciders to Revoke Excessive Authorizations. SOUPS @ USENIX Security Symposium 2024: 239-258 - Elijah Robert Bouma-Sims, Hiba Hassan, Alexandra Nisenoff, Lorrie Faith Cranor, Nicolas Christin:
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit. SOUPS @ USENIX Security Symposium 2024: 333-352 - Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, Elissa M. Redmiles:
"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imagery. SOUPS @ USENIX Security Symposium 2024: 373-392 - Xiaowei Chen, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, Vincent Koenig, Verena Distler:
What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. SOUPS @ USENIX Security Symposium 2024: 487-506 - Kelsey R. Fulton, Joseph Lewis, Nathan Malkin, Michelle L. Mazurek:
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies. SOUPS @ USENIX Security Symposium 2024: 81-100 - Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan A. Hutson, Damon McCoy:
"Say I'm in public...I don't want my nudes to pop up." User Threat Models for Using Vault Applications. SOUPS @ USENIX Security Symposium 2024: 433-451 - Nina Gerber, Alina Stöver, Peter Mayer:
Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field. SOUPS @ USENIX Security Symposium 2024: 547-566 - Geetika Gopi, Aadyaa Maddi, Omkhar Arasaratnam, Giulia Fanti:
Privacy Requirements and Realities of Digital Public Goods. SOUPS @ USENIX Security Symposium 2024: 159-177 - Julie M. Haney, Clyburn Cunningham IV, Susanne M. Furman:
Towards Bridging the Research-Practice Gap: Understanding Researcher-Practitioner Interactions and Challenges in Human-Centered Cybersecurity. SOUPS @ USENIX Security Symposium 2024: 567-586 - Maximilian Häring, Julia Angelika Grohs, Eva Tiefenau, Matthew Smith, Christian Tiefenau:
Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario. SOUPS @ USENIX Security Symposium 2024: 259-278 - Samantha Katcher, Liana Wang, Caroline Yang, Chloé Messdaghi, Michelle L. Mazurek, Marshini Chetty, Kelsey R. Fulton, Daniel Votipka:
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community. SOUPS @ USENIX Security Symposium 2024: 1-20 - Joy McLeod, Leah Zhang-Kennedy, Elizabeth Stobert:
Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy Educational Resources. SOUPS @ USENIX Security Symposium 2024: 587-603 - Phoebe Moh, Andrew Yang, Nathan Malkin, Michelle L. Mazurek:
Understanding How People Share Passwords. SOUPS @ USENIX Security Symposium 2024: 219-237 - Lachlan Moore, Tatsuya Mori, Ayako Akiyama Hasegawa:
Negative Effects of Social Triggers on User Security and Privacy Behaviors. SOUPS @ USENIX Security Symposium 2024: 605-622 - Ivoline C. Ngong, Brad Stenger, Joseph P. Near, Yuanyuan Feng:
Evaluating the Usability of Differential Privacy Tools with Data Practitioners. SOUPS @ USENIX Security Symposium 2024: 21-40 - Sunyup Park, Weijia He, Elmira Deldari, Pardis Emami Naeini, Danny Yuxing Huang, Jessica Vitak, Yaxing Yao, Michael Zimmer:
Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties. SOUPS @ USENIX Security Symposium 2024: 179-198 - Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka:
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts. SOUPS @ USENIX Security Symposium 2024: 353-372 - Sarah Prange, Pascal Knierim, Gabriel Knoll, Felix Dietz, Alexander De Luca, Florian Alt:
"I do (not) need that Feature!" - Understanding Users' Awareness and Control of Privacy Permissions on Android Smartphones. SOUPS @ USENIX Security Symposium 2024: 453-472 - Alexandra von Preuschen, Monika C. Schuhmacher, Verena Zimmermann:
Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in Cybersecurity. SOUPS @ USENIX Security Symposium 2024: 623-642 - Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, Sepideh Ghanavati:
Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams. SOUPS @ USENIX Security Symposium 2024: 101-120 - Maike M. Raphael, Aikaterini Kanta, Rico Seebonn, Markus Dürmuth, Camille Cobb:
Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies. SOUPS @ USENIX Security Symposium 2024: 199-218 - Neele Roch, Hannah Sievers, Lorin Schöni, Verena Zimmermann:
Navigating Autonomy: Unveiling Security Experts' Perspectives on Augmented Intelligence in Cybersecurity. SOUPS @ USENIX Security Symposium 2024: 41-60 - Sarah Tabassum, Cori Faklaris, Heather Richter Lipford:
What Drives SMiShing Susceptibility? A U.S. Interview Study of How and Why Mobile Phone Users Judge Text Messages to be Real or Fake. SOUPS @ USENIX Security Symposium 2024: 393-411 - Madiha Tabassum, Alana Mackey, Ada Lerner:
'Custodian of Online Communities': How Moderator Mutual Support in Communities Help Fight Hate and Harassment Online. SOUPS @ USENIX Security Symposium 2024: 297-314 - Stef Verreydt, Koen Yskout, Laurens Sion, Wouter Joosen:
Threat modeling state of practice in Dutch organizations. SOUPS @ USENIX Security Symposium 2024: 473-486 - Noel Warford, Nicholas Farber, Michelle L. Mazurek:
How Entertainment Journalists Manage Online Hate and Harassment. SOUPS @ USENIX Security Symposium 2024: 279-295 - Maximiliane Windl, Jan Leusmann, Albrecht Schmidt, Sebastian S. Feger, Sven Mayer:
Privacy Communication Patterns for Domestic Robots. SOUPS @ USENIX Security Symposium 2024: 121-138
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-22 22:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint