Παρακολούθηση
Noura N. Alomar
Noura N. Alomar
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα berkeley.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
732017
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
442017
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99, 519-535, 2017
422017
" You've got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild
N Alomar, P Wijesekera, E Qiu, S Egelman
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 319-339, 2020
392020
Performance-based comparative assessment of open source web vulnerability scanners
M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman
Security and Communication Networks 2017, 2017
382017
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
342016
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
N Alomar, S Egelman
Proceedings on Privacy Enhancing Technologies, 2022
272022
Human factors in the design and evaluation of bioinformatics tools
N Al-Ageel, A Al-Wabil, G Badr, N AlOmar
Procedia Manufacturing 3, 2003-2010, 2015
272015
The design of a hybrid cultural model for Arabic gamified systems
N Alomar, V Wanick, G Wills
Computers in human behavior 64, 472-485, 2016
252016
Behavioral consequences of Pokémon GO: the exaggerated picture
N Alomar, M Alsaleh, A Alarifi
Computers in Human Behavior 90, 223-245, 2019
222019
A qualitative model of older adults’ contextual decision-making about information sharing
A Frik, J Bernd, N Alomar, S Egelman
Workshop on the Economics of Information Security (WEIS 2020), 2020
152020
Color image ray transform technique for detecting phishing web pages
AM Alhumaisan, MA Alsaleh, NN Alomar
US Patent App. 15/333,647, 2018
152018
Usability engineering of agile software project management tools
N Alomar, N Almobarak, S Alkoblan, S Alhozaimy, S Alharbi
Design, User Experience, and Usability: Design Thinking and Methods: 5th …, 2016
152016
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts
N Alomar, M Alsaleh, A Alarifi
Computers & Security 85, 300-312, 2019
132019
Method and system for dynamically generating a hint to recall a password for a user account of a user
AS Alarifi, MA Alsaleh, NN Alomar
US Patent 10,440,008, 2019
62019
Security and Privacy Failures in Popular {2FA} Apps
C Gilsenan, F Shakir, N Alomar, S Egelman
32nd USENIX Security Symposium (USENIX Security 23), 2079-2096, 2023
52023
Method and system for managing a gamified trustee based social authentication to recover an account of a user
NN Alomar, MA Alsaleh
US Patent App. 15/259,047, 2018
52018
Lessons in vcr repair: Compliance of android app developers with the california consumer privacy act (ccpa)
N Samarin, S Kothari, Z Siyed, O Bjorkman, R Yuan, P Wijesekera, ...
arXiv preprint arXiv:2304.00944, 2023
42023
Decentralized backup and recovery of TOTP secrets
C Gilsenan, N Alomar, A Huang, S Egelman
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020
22020
Someone in your contact list: Cued recall-based textual passwords
N Alomar, M Alsaleh, A Alarifi
IEEE Transactions on Information Forensics and Security 12 (11), 2574-2589, 2017
22017
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20