From very weak to very strong: Analyzing password-strength meters X de Carné de Carnavalet, M Mannan Network and Distributed System Security Symposium (NDSS 2014), 2014 | 187 | 2014 |
A Large-Scale Evaluation of High-Impact Password Strength Meters X de Carné de Carnavalet, M Mannan ACM Transactions on Information and System Security (TISSEC) 18 (1), 1, 2015 | 96 | 2015 |
Killed by proxy: Analyzing client-end TLS interception software X de Carné de Carnavalet, M Mannan Network and Distributed System Security Symposium, 2016 | 91 | 2016 |
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security M Zhang, X de Carné de Carnavalet, L Wang, A Ragab IEEE Transactions on Information Forensics and Security 14 (9), 2315-2330, 2019 | 28 | 2019 |
Challenges and implications of verifiable builds for security-critical open-source software X de Carné de Carnavalet, M Mannan Proceedings of the 30th Annual Computer Security Applications Conference, 16-25, 2014 | 16 | 2014 |
A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic X de Carné de Carnavalet, PC van Oorschot ACM Computing Surveys 55 (13s), 1-40, 2023 | 15 | 2023 |
Privacy and Security Risks of" Not-a-Virus" Bundled Adware: The Wajam Case X de Carné de Carnavalet, M Mannan arXiv preprint arXiv:1905.05224, 2019 | 6 | 2019 |
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem X de Carné de Carnavalet Concordia University, 2019 | 3 | 2019 |
Face recognition using multi-class Logical Analysis of Data A Ragab, X de Carné de Carnavalet, S Yacout, MS Ouali Pattern Recognition and Image Analysis 27 (2), 276-288, 2017 | 3 | 2017 |
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD S Zhang, M Cai, M Zhang, L Zhao, X de Carné de Carnavalet CloudCom, 2023 | | 2023 |