Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sweetening android lemon markets: measuring and combating malware in application marketplaces., and . CODASPY, page 197-208. ACM, (2013)Correct horse battery staple: exploring the usability of system-assigned passphrases., , , , , , , , and . SOUPS, page 7. ACM, (2012)How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 65-80. USENIX Association, (2012)MemCorp: An Open Data Corpus for Memory Analysis.. HICSS, page 1-6. IEEE Computer Society, (2011)Helping Users Create Better Passwords., , , , , , , , , and 4 other author(s). login Usenix Mag., (2012)Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge., and . Digit. Investig., (2018)Toward a general collection methodology for Android devices., , and . Digit. Investig., 8 (Supplement): S14-S24 (2011)OpenLV: Empowering investigators and first-responders in the digital forensics process., , and . Digit. Investig., 11 (Supplement 1): S45-S53 (2014)Providing a Foundation for Analysis of Volatile Data Stores.. J. Digit. Forensics Secur. Law, 2 (3): 45-56 (2007)Measuring password guessability for an entire university., , , , , , , , and . CCS, page 173-186. ACM, (2013)