关注
Majed Almansoori
Majed Almansoori
Ph.D. Candidate at the University of Wisconsin-Madison
在 wisc.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
How secure are our computer systems courses?
M Almansoori, J Lam, E Fang, K Mulligan, AG Soosai Raj, R Chatterjee
Proceedings of the 2020 ACM conference on international computing education …, 2020
182020
Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse
S Stephenson, M Almansoori, P Emami-Naeini, DY Huang, R Chatterjee
32nd USENIX Security Symposium (USENIX Security 23), 69-86, 2023
142023
" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse
S Stephenson, M Almansoori, P Emami-Naeini, R Chatterjee
32nd USENIX Security Symposium (USENIX Security 23), 105-122, 2023
132023
Identifying gaps in the secure programming knowledge and skills of students
J Lam, E Fang, M Almansoori, R Chatterjee, AG Soosai Raj
Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022
122022
A global survey of android dual-use applications used in intimate partner surveillance
M Almansoori, A Gallardo, J Poveda, A Ahmed, R Chatterjee
Proceedings on Privacy Enhancing Technologies, 2022
112022
Textbook underflow: Insufficient security discussions in textbooks used for computer systems courses
M Almansoori, J Lam, E Fang, AG Soosai Raj, R Chatterjee
Proceedings of the 52nd ACM technical symposium on computer science …, 2021
102021
Towards finding the missing pieces to teach secure programming skills to students
M Almansoori, J Lam, E Fang, AG Soosai Raj, R Chatterjee
Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023
32023
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance
M Almansoori, M Islam, S Ghosh, M Mondal, R Chatterjee
2024 IEEE European Symposium on Security and Privacy (EuroS&P), 2024
12024
Analyzing the Patterns and Behavior of Users When Detecting and Preventing Tech-enabled Stalking
N Ceccio, N Gupta, M Almansoori, R Chatterjee
12023
系统目前无法执行此操作,请稍后再试。
文章 1–9