关注
Kami Vaniea
标题
引用次数
年份
Not as easy as just update: Survey of System Administrators and Patching Behaviours
ADG Jenkins, L Liu, MK Wolters, K Vaniea
Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-17, 2024
22024
Data-Enhanced design: Engaging designers in exploratory sensemaking with multimodal data
K Gorkovenko, A Jenkins, K Vaniea, D Murray-Rust
International Journal of Design 17 (3), 1-23, 2023
22023
Using Clustering Algorithms to Automatically Identify Phishing Campaigns
K Althobaiti, K Vaniea, MK Wolters, N Alsufyani
IEEE Access, 2023
52023
To Patch, or not To Patch? That is the Question: A Case Study of System Administrators' Online Collaborative Behaviour
A Jenkins, M Wolters, K Vaniea
arXiv preprint arXiv:2307.03609, 2023
22023
DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs
D Kirkman, K Vaniea, DW Woods
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 847-867, 2023
42023
Multi-User Smart Speakers-A Narrative Review of Concerns and Problematic Interactions
N Meng-Schneider, R Yasa Kostas, K Vaniea, MK Wolters
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing …, 2023
42023
Twitter has a binary privacy setting, are users aware of how it works?
D Keküllüoglu, K Vaniea, MK Wolters, W Magdy
Proceedings of the ACM on Human-Computer Interaction 7 (CSCW1), 1-18, 2023
22023
“I didn’t click”: What users say when reporting phishing
N Pilavakis, A Jenkins, N Kokciyan, KE Vaniea
Symposium on Usable Security and Privacy (USEC) 2023, 1-13, 2023
32023
Context-based clustering to mitigate phishing attacks
T Saka, K Vaniea, N Kökciyan
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022
52022
Embedding privacy into design through software developers: Challenges and solutions
M Tahaei, K Vaniea, A Rashid
IEEE Security & Privacy 21 (1), 49-57, 2022
112022
Phished: Automated contextual feedback for reported phishing
A Jenkins, N Kokciyan, KE Vaniea
18th Symposium on Usable Privacy and Security. Usenix, 2022
52022
Connected tech: smart or sinister? Written evidence submitted by REPHRAIN-the National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (TEC0043)
B Zieni, C Mujeeb, M CARR, P Chowdhury, L Coventry, F Dupressoir, ...
UK Parliament, 2022
2022
Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality
F Mathis, J O'hagan, K Vaniea, M Khamis
Proceedings of the 2022 International Conference on Advanced Visual …, 2022
232022
From an authentication question to a public social event: Characterizing birthday sharing on Twitter
D Keküllüoğlu, W Magdy, K Vaniea
Proceedings of the International AAAI Conference on Web and Social Media 16 …, 2022
52022
Lessons Learned From Recruiting Participants With Programming Skills for Empirical Privacy and Security Studies
M Tahaei, K Vaniea
RoPES-ICSE 2022, 2022
32022
Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list
M Tahaei, K Vaniea
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
432022
Understanding privacy switching behaviour on Twitter
D Kekulluoglu, K Vaniea, W Magdy
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
132022
Prototyping usable privacy and security systems: Insights from experts
F Mathis, K Vaniea, M Khamis
International Journal of Human–Computer Interaction 38 (5), 468-490, 2022
262022
Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research
F Mathis, J O’Hagan, M Khamis, K Vaniea
2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 291-300, 2022
182022
Can i borrow your atm? using virtual reality for (simulated) in situ authentication research
F Mathis, K Vaniea, M Khamis
2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 301-310, 2022
112022
系统目前无法执行此操作,请稍后再试。
文章 1–20