Defensive technology use by political activists during the Sudanese revolution A Daffalla, L Simko, T Kohno, AG Bardas 2021 IEEE symposium on security and privacy (SP), 372-390, 2021 | 36 | 2021 |
Sok: Safer digital-safety research involving at-risk users R Bellini, E Tseng, N Warford, A Daffalla, T Matthews, S Consolvo, ... arXiv preprint arXiv:2309.00735, 2023 | 10 | 2023 |
Late acceptance selection hyper-heuristic for wind farm layout optimisation problem H Abdulaziz, A Elnahas, A Daffalla, Y Noureldien, A Kheiri, E Özcan 2018 International Conference on Computer, Control, Electrical, and …, 2018 | 3 | 2018 |
Defensive Technology Use During the 2018-2019 Sudanese Revolution A Daffalla, L Simko, T Kohno, AG Bardas IEEE Security & Privacy 20 (2), 40-48, 2021 | 2 | 2021 |
Selection hyper-heuristics for solving the wind farm layout optimisation problem A Kheiri, A Daffalla, Y Noureldien, E Özcan Proceedings of the 8th Multidisciplinary International Conference on …, 2017 | 2 | 2017 |
Account security interfaces: important, unintuitive, and untrustworthy A Daffalla, M Bohuk, N Dell, R Bellini, T Ristenpart 32nd USENIX Security Symposium (USENIX Security 23), 3601-3618, 2023 | 1 | 2023 |
Political Activism and Technology A Daffalla, AG Bardas AI Embedded Assurance for Cyber Systems, 23-36, 2023 | | 2023 |
Security & Privacy Practices and Threat Models of Activists during a Political Revolution A Daffalla University of Kansas, 2021 | | 2021 |