Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements TD Breaux, H Hibshi, A Rao Requirements Engineering 19, 281-307, 2014 | 123 | 2014 |
Expecting the unexpected: Understanding mismatched privacy expectations online A Rao, F Schaub, N Sadeh, A Acquisti, R Kang Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 77-96, 2016 | 119 | 2016 |
What do they know about me? Contents and Concerns of Online Behavioral Profiles A Rao, F Schaub, N Sadeh PASSAT 2014: International Conference on Information Privacy, Security, Risk …, 2015 | 85* | 2015 |
Effect of grammar on security of long passwords A Rao, B Jha, G Kini Proceedings of the third ACM conference on Data and application security and …, 2013 | 78 | 2013 |
Formal analysis of privacy requirements specifications for multi-tier applications TD Breaux, A Rao 2013 21st IEEE international requirements engineering conference (RE), 14-23, 2013 | 53 | 2013 |
Privacy and behavioral advertising: Towards meeting users’ preferences PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh Symposium on usable privacy and security (SOUPS), 22-24, 2015 | 24 | 2015 |
Towards usable privacy policies: Semi-automatically extracting data practices from websites’ privacy policies N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, J Reidenberg, ... Poster Proceedings, SOUPS, 9-11, 2014 | 21 | 2014 |
Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach I Ruchkin, A Rao, D De Niz, S Chaki, D Garlan Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015 | 19 | 2015 |
Why people are (un) willing to share information with online advertisers PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh Sixth ASE International Conference on Privacy, Security, Risk and Trust, 2015 | 18 | 2015 |
Smartphone fingerprint authentication versus pins: a usability study S Karthikeyan, S Feng, A Rao, N Sadeh ed: Carnegie Mellon University Technical Reports:, 14-012, 2014 | 14 | 2014 |
Distributed deep learning using volunteer computing-like paradigm M Atre, B Jha, A Rao 2021 IEEE International Parallel and Distributed Processing Symposium …, 2021 | 10 | 2021 |
Less is more? investigating the role of examples in security studies using analogical transfer A Rao, H Hibshi, T Breaux, JM Lehker, J Niu Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014 | 7 | 2014 |
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models B Jha, M Atre, A Rao 2022 IEEE 4th International Conference on Trust, Privacy and Security in …, 2022 | 6* | 2022 |
Types of privacy expectations A Rao, J Pfeffer Frontiers in big Data 3, 7, 2020 | 5 | 2020 |
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns TD Breaux, H Hibshi, A Rao, JM Lehker 2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012 | 4 | 2012 |
Data siphoning across borders: The role of internet tracking A Rao, J Pfeffer 2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019 | 3 | 2019 |
Assessing the impact of data practices on user privacy A Rao Technische Universität München, 2018 | 2 | 2018 |
Managing Risk in Mobile Applications With Formal Security Policies T Breaux, A Rao Acquisition Research Program, 2013 | 2 | 2013 |
Security Implications of Induced Earthquakes A Rao, B Jha 2016 AGU Fall Meeting, 2016 | | 2016 |
Security Implications of Induced Earthquakes B Jha, A Rao AGU Fall Meeting Abstracts 2016, S31B-2768, 2016 | | 2016 |