What’s in a Cyber Threat Intelligence sharing platform? A mixed-methods user experience investigation of MISP B Stojkovski, G Lenzini, V Koenig, S Rivas Annual Computer Security Applications Conference, 385-398, 2021 | 16 | 2021 |
Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system B Stojkovski, IV Sandoval, G Lenzini 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019 | 6 | 2019 |
A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms B Stojkovski, G Lenzini 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 3 | 2021 |
"I personally relate it to the traffic light" a user study on security & privacy indicators in a secure email system committed to privacy by default B Stojkovski, G Lenzini, V Koenig Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1235-1246, 2021 | 3 | 2021 |
Evaluating ambiguity of privacy indicators in a secure email app B Stojkovski, G Lenzini Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy …, 2020 | 3 | 2020 |
“Unless one does the research, it may seem as just a useless battery-consuming app”–Field Notes on COVID-19 Contact Tracing Applications B Stojkovski, R Abu-Salma, K Triquet, G Lenzini Digital Threats: Research and Practice (DTRAP) 3 (3), 1-17, 2022 | 1 | 2022 |
User Experience Design for Cybersecurity & Privacy: addressing user misperceptions of system security and privacy B Stojkovski University of Luxembourg, Esch-sur-Alzette, Luxembourg, 2022 | | 2022 |
A Protocol to Strengthen Password-Based Authentication I Vazquez Sandoval, B Stojkovski, G Lenzini Emerging Technologies for Authorization and Authentication: First …, 2018 | | 2018 |