Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing Request-Flow Comparison to Aid Performance Diagnosis in Distributed Systems., , , and . IEEE Trans. Vis. Comput. Graph., 19 (12): 2466-2475 (2013)Build It, Break It, Fix It: Contesting Secure Development., , , , , , , and . CoRR, (2019)A Tag-Based, Logical Access-Control Framework for Personal File Sharing.. Carnegie Mellon University, USA, (2014)Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes., , , , , and . login Usenix Mag., (2020)Equitable Security: Optimizing Distribution of Nudges and Resources., , , and . ACM Conference on Computer and Communications Security, page 2270-2272. ACM, (2018)How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior., , and . ACM Conference on Computer and Communications Security, page 666-677. ACM, (2016)How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples., , and . IEEE Symposium on Security and Privacy, page 1326-1343. IEEE, (2019)The Effectiveness of Security Images in Internet Banking., , and . IEEE Internet Comput., 19 (1): 54-62 (2015)Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)An Observational Investigation of Reverse Engineers' Processes., , , , and . USENIX Security Symposium, page 1875-1892. USENIX Association, (2020)