Следене
Hassan Khan
Заглавие
Позовавания
Позовавания
Година
Itus: an implicit authentication framework for android
H Khan, A Atwater, U Hengartner
Proceedings of the 20th annual international conference on Mobile computing …, 2014
982014
Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying
H Khan, U Hengartner, D Vogel
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 225-239, 2015
762015
Towards application-centric implicit authentication on smartphones
H Khan, U Hengartner
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
722014
A comparative evaluation of implicit authentication schemes
H Khan, A Atwater, U Hengartner
International Workshop on Recent Advances in Intrusion Detection, 255-275, 2014
572014
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane
R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ...
2012 European Workshop on Software Defined Networking, 79-84, 2012
552012
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
552011
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes
H Khan, U Hengartner, D Vogel
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
522016
Evaluating attack and defense strategies for smartphone pin shoulder surfing
H Khan, U Hengartner, D Vogel
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
362018
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication
H Khan, U Hengartner, D Vogel
Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018
322018
Automated anomaly detector adaptation using adaptive threshold tuning
MQ Ali, E Al-Shaer, H Khan, SA Khayam
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-30, 2013
322013
What is the impact of p2p traffic on anomaly detection?
IU Haq, S Ali, H Khan, SA Khayam
International Workshop on Recent Advances in Intrusion Detection, 1-17, 2010
282010
Evaluating authentication options for mobile health applications in younger and older adults
K Grindrod, H Khan, U Hengartner, S Ong, AG Logan, D Vogel, R Gebotys, ...
PloS one 13 (1), 2018
232018
Determining malicious executable distinguishing attributes and low-complexity detection
H Khan, F Mirza, SA Khayam
Journal in computer virology 7 (2), 95-105, 2011
232011
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communications …, 2009
172009
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel
H Khan, M Javed, F Mirza, SA Khayam
National University of Science & Technology (NUST), Islamabad 44000, 0
15*
Embedding a covert channel in active network connections
H Khan, Y Javed, F Mirza, SA Khayam
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
142009
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones
L Agarwal, H Khan, U Hengartner
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
102016
Mimicry Attacks on Smartphone Keystroke Authentication
H Khan, U Hengartner, D Vogel
ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-34, 2020
72020
POSTER: When and How to Implicitly Authenticate Smartphone Users
A Atwater, H Khan, U Hengartner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
72014
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal
J Ceci, H Khan, U Hengartner, D Vogel
Seventeenth Symposium on Usable Privacy and Security ({SOUPS} 2021), 455-474, 2021
52021
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20