关注
Noura N. Alomar
标题
引用次数
引用次数
年份
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
762017
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
462017
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99, 519-535, 2017
442017
Performance‐based comparative assessment of open source web vulnerability scanners
M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman
Security and Communication Networks 2017 (1), 6158107, 2017
412017
" You've got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild
N Alomar, P Wijesekera, E Qiu, S Egelman
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 319-339, 2020
402020
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
352016
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
N Alomar, S Egelman
Proceedings on Privacy Enhancing Technologies, 2022
272022
Human factors in the design and evaluation of bioinformatics tools
N Al-Ageel, A Al-Wabil, G Badr, N AlOmar
Procedia Manufacturing 3, 2003-2010, 2015
272015
Behavioral consequences of Pokémon GO: the exaggerated picture
N Alomar, M Alsaleh, A Alarifi
Computers in Human Behavior 90, 223-245, 2019
252019
The design of a hybrid cultural model for Arabic gamified systems
N Alomar, V Wanick, G Wills
Computers in human behavior 64, 472-485, 2016
252016
A qualitative model of older adults’ contextual decision-making about information sharing
A Frik, J Bernd, N Alomar, S Egelman
Workshop on the Economics of Information Security (WEIS 2020), 2020
152020
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts
N Alomar, M Alsaleh, A Alarifi
Computers & Security 85, 300-312, 2019
152019
Color image ray transform technique for detecting phishing web pages
AM Alhumaisan, MA Alsaleh, NN Alomar
US Patent App. 15/333,647, 2018
152018
Usability engineering of agile software project management tools
N Alomar, N Almobarak, S Alkoblan, S Alhozaimy, S Alharbi
Design, User Experience, and Usability: Design Thinking and Methods: 5th …, 2016
152016
Lessons in vcr repair: Compliance of android app developers with the california consumer privacy act (ccpa)
N Samarin, S Kothari, Z Siyed, O Bjorkman, R Yuan, P Wijesekera, ...
arXiv preprint arXiv:2304.00944, 2023
62023
Method and system for dynamically generating a hint to recall a password for a user account of a user
AS Alarifi, MA Alsaleh, NN Alomar
US Patent 10,440,008, 2019
62019
Security and Privacy Failures in Popular {2FA} Apps
C Gilsenan, F Shakir, N Alomar, S Egelman
32nd USENIX Security Symposium (USENIX Security 23), 2079-2096, 2023
52023
Method and system for managing a gamified trustee based social authentication to recover an account of a user
NN Alomar, MA Alsaleh
US Patent App. 15/259,047, 2018
52018
Decentralized backup and recovery of TOTP secrets
C Gilsenan, N Alomar, A Huang, S Egelman
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020
22020
Someone in your contact list: Cued recall-based textual passwords
N Alomar, M Alsaleh, A Alarifi
IEEE Transactions on Information Forensics and Security 12 (11), 2574-2589, 2017
22017
系统目前无法执行此操作,请稍后再试。
文章 1–20