researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
case study
data-flow
design
e-science
graph-rewriting
meta-model
meta-objects
mobile
mobile code
model-driven engineering
object-role modeling
rewriting
rule-based
security
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Anil Somayaji
Carrie Gates
Filipo Sharevski
Hilary H. Hosmer
Karen Renaud
Karl N. Levitt
Kenneth G. Olthoff
Lizzie Coles-Kemp
Martina Angela Sasse
Mary Ellen Zurko
Matt Bishop
Michael E. Locasto
Michael Franz
Paul C. van Oorschot
Peter L. Reiher
Richard Ford
Sean Peisert
Simon N. Foley
Steven J. Greenwald
Wolter Pieters
Filter by Top terms
[+]
OR
AND
NOT
1
approach
computer
control
design
information
model
new
paradigm
paradigms
privacy
proceedings
secure
security
september
software
system
systems
towards
usa
workshop
NSPW (nspw)
Editions
Publications
Viewing Publication 1 - 100 from 434
2023
Proceedings of the 2023 New Security Paradigms Workshop, NSPW 2023, Segovia, Spain, September 18-21, 2023
ACM,
2023.
[doi]
Human-centered Behavioral and Physiological Security
Florian Alt
,
Mariam Hassib
,
Verena Distler
.
nspw 2023
:
48-61
[doi]
Escaping Vendor Mortality: A New Paradigm for Extending IoT Device Longevity
Conner Bradley
,
David Barrera 0003
.
nspw 2023
:
1-16
[doi]
'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach
Partha Das Chowdhury
,
Karen Renaud
.
nspw 2023
:
76-91
[doi]
Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns
Ivan Flechais
,
George Chalhoub
.
nspw 2023
:
62-75
[doi]
Towards a Typology of Interdisciplinarity in Cybersecurity: Trade, Choice, and Agnostic-Antagonist
Laura Anna Kocksch
,
Estrid Sørensen
.
nspw 2023
:
116-129
[doi]
ExD: Explainable Deletion
Kopo Marvin Ramokapane
,
Awais Rashid
.
nspw 2023
:
34-47
[doi]
"I Just Didn't Notice It: " Experiences with Misinformation Warnings on Social Media amongst Users Who Are Low Vision or Blind
Filipo Sharevski
,
Aziz N. Zeidieh
.
nspw 2023
:
17-33
[doi]
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design
Mattea Sim
,
Kurt Hugenberg
,
Tadayoshi Kohno
,
Franziska Roesner
.
nspw 2023
:
102-115
[doi]
Endoprocess: Programmable and Extensible Subprocess Isolation
Fangfei Yang
,
Weijie Huang
,
Kelly Kaoudis
,
Anjo Vahldiek-Oberwagner
,
Nathan Dautenhahn
.
nspw 2023
:
92-101
[doi]
2022
Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022, North Conway, NH, USA, October 24-27, 2022
ACM,
2022.
[doi]
"It may be a pain in the backside but..." Insights into the resilience of business after GDPR
Gerard Buckley
,
Tristan Caulfield
,
Ingolf Becker
.
nspw 2022
:
21-34
[doi]
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs
Partha Das Chowdhury
,
Andrés Domínguez Hernández
,
Kopo Marvin Ramokapane
,
Awais Rashid
.
nspw 2022
:
60-74
[doi]
Passwords and Cryptwords: The Final Limits on Lengths
Michael Clark
,
Kent E. Seamons
.
nspw 2022
:
75-89
[doi]
Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces
Michael Clifford
,
Miriam Heller
,
Karl N. Levitt
,
Matt Bishop
.
nspw 2022
:
90-103
[doi]
Transparency, Compliance, And Contestability When Code Is(n't) Law
Alexander Hicks
.
nspw 2022
:
130-142
[doi]
Side Auth: Synthesizing Virtual Sensors for Authentication
Yan Long
,
Kevin Fu
.
nspw 2022
:
35-44
[doi]
Toward User Control over Information Access: A Sociotechnical Approach
Caleb Malchik
,
Joan Feigenbaum
.
nspw 2022
:
117-129
[doi]
Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging
Nathan Malkin
.
nspw 2022
:
104-116
[doi]
Cybersecurity Regrets: I've had a few.... Je Ne Regrette
Karen Renaud
,
Rosalind Searle
,
Marc J. Dupuis
.
nspw 2022
:
1-20
[doi]
Designing Through The Stack: The Case for a Participatory Digital Security By Design
Ian Slesinger
,
Lizzie Coles-Kemp
,
Niki Panteli
,
René Rydhof Hansen
.
nspw 2022
:
45-59
[doi]
2021
NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021
ACM,
2021.
[doi]
Beyond NVD: Cybersecurity meets the Semantic Web
Raúl Aranovich
,
Muting Wu
,
Dian Yu
,
Katya Katsy
,
Benyamin Ahmadnia
,
Matthew Bishop
,
Vladimir Filkov
,
Kenji Sagae
.
nspw 2021
:
59-69
[doi]
COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs
Kevin Gallagher
,
Santiago Torres-Arias
,
Nasir D. Memon
,
Jessica Feldman
.
nspw 2021
:
13-27
[doi]
"Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting
Jonas Hielscher
,
Annette Kluge
,
Uta Menges
,
M. Angela Sasse
.
nspw 2021
:
108-122
[doi]
The tragedy of common bandwidth: rDDoS
Arturs Lavrenovs
,
Eireann Leverett
,
Aaron Kaplan
.
nspw 2021
:
43-58
[doi]
Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation Security
Simon Parkin
,
Simon Arnell
,
Jeremy Ward
.
nspw 2021
:
28-42
[doi]
Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?
Karen Renaud
,
Rosalind Searle
,
Marc J. Dupuis
.
nspw 2021
:
70-87
[doi]
VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information Discourse
Filipo Sharevski
,
Peter Jachim
,
Emma Pieroni
,
Nate Jachim
.
nspw 2021
:
88-107
[doi]
Blessed Are The Lawyers, For They Shall Inherit Cybersecurity
Daniel W. Woods
,
Aaron Ceross
.
nspw 2021
:
1-12
[doi]
2020
Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy
Susan Landau 0001
.
nspw 2020
:
1-19
[doi]
NSPW '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020
ACM,
2020.
[doi]
Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development
Debi Ashenden
,
Gail Ollis
.
nspw 2020
:
34-44
[doi]
Transcending the Teetering Tower of Trust: Demonstrated with Virtual Memory Fuses for Software Enclaves
Scott Brookes
.
nspw 2020
:
90-98
[doi]
Towards In-Band Non-Cryptographic Authentication
Nour Dabbour
,
Anil Somayaji
.
nspw 2020
:
20-33
[doi]
The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely
Verena Distler
,
Gabriele Lenzini
,
Carine Lallemand
,
Vincent Koenig
.
nspw 2020
:
45-58
[doi]
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic
Peter Jachim
,
Filipo Sharevski
,
Paige Treebridge
.
nspw 2020
:
59-75
[doi]
Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity
Justin Joque
,
S. M. Taiabul Haque
.
nspw 2020
:
99-110
[doi]
Trust-Based Security; Or, Trust Considered Harmful
Abe Singer
,
Matt Bishop
.
nspw 2020
:
76-89
[doi]
Out of Sight, Out of Mind: UI Design and the Inhibition of Mental Models of Security
Eric Spero
,
Robert Biddle
.
nspw 2020
:
127-143
[doi]
On managing vulnerabilities in AI/ML systems
Jonathan M. Spring
,
April Galyardt
,
Allen D. Householder
,
Nathan M. VanHoudnos
.
nspw 2020
:
111-126
[doi]
2019
Towards models for quantifying the known adversary
Alaadin Addas
,
Julie Thorpe
,
Amirali Salehi-Abari
.
nspw 2019
:
103-117
[doi]
FrameProv: towards end-to-end video provenance
Mansoor Ahmed-Rengers
.
nspw 2019
:
68-77
[doi]
Employing attack graphs for intrusion detection
Frank Capobianco
,
Rahul George
,
Kaiming Huang
,
Trent Jaeger
,
Srikanth V. Krishnamurthy
,
Zhiyun Qian
,
Mathias Payer
,
Paul Yu
.
nspw 2019
:
16-30
[doi]
NSPW '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019
Marco Carvalho
,
Wolter Pieters
,
Elizabeth Stobert
, editors,
ACM,
2019.
[doi]
Why Jenny can't figure out which of these messages is a covert information operation
Tristan Caulfield
,
Jonathan M. Spring
,
M. Angela Sasse
.
nspw 2019
:
118-128
[doi]
Privacy controls for always-listening devices
Nathan Malkin
,
Serge Egelman
,
David A. Wagner 0001
.
nspw 2019
:
78-91
[doi]
Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse
Simon Parkin
,
Trupti Patel
,
Isabel Lopez-Neira
,
Leonie Tanczer
.
nspw 2019
:
1-15
[doi]
Everything-as-a-hack: claims-making for access to digital and social resources
Wolter Pieters
.
nspw 2019
:
92-102
[doi]
Cyber security fear appeals: unexpectedly complicated
Karen Renaud
,
Marc Dupuis
.
nspw 2019
:
42-56
[doi]
Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension
Filipo Sharevski
,
Paige Treebridge
,
Jessica Westbrook
.
nspw 2019
:
31-41
[doi]
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm
Fiona Westin
,
Sonia Chiasson
.
nspw 2019
:
57-67
[doi]
2018
Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018
Marco Carvalho 0001
,
Matt Bishop
,
Anil Somayaji
,
Wolter Pieters
,
Mohammad Mannan
, editors,
ACM,
2018.
[doi]
Going Dark: A Retrospective on the North American Blackout of 2038
Prashant Anantharaman
,
J. Peter Brady
,
Patrick Flathers
,
Vijay H. Kothari
,
Michael C. Millian
,
Jason Reeves
,
Nathan Reitinger
,
William G. Nisen
,
Sean W. Smith
.
nspw 2018
:
52-63
[doi]
Augmenting Machine Learning with Argumentation
Matt Bishop
,
Carrie Gates
,
Karl N. Levitt
.
nspw 2018
:
1-11
[doi]
After the BlockCLoud Apocalypse
Mark Burgess
,
Anil Somayaji
.
nspw 2018
:
103-109
[doi]
Rethinking the Proposition of Privacy Engineering
Aaron Ceross
,
Andrew Simpson
.
nspw 2018
:
89-102
[doi]
Can Software Licenses Contribute to Cyberarms Control?
Steve Dierker
,
Volker Roth 0002
.
nspw 2018
:
41-51
[doi]
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules
Diptendu Mohan Kar
,
Indrajit Ray
,
Jenna Gallegos
,
Jean Peccoud
.
nspw 2018
:
110-122
[doi]
Against Mindset
Arne Padmos
.
nspw 2018
:
12-27
[doi]
On Security Singularities
Wolter Pieters
.
nspw 2018
:
80-88
[doi]
An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice
Vivien M. Rooney
,
Simon N. Foley
.
nspw 2018
:
64-79
[doi]
Malicious User Experience Design Research for Cybersecurity
Adam Trowbridge
,
Filipo Sharevski
,
Jessica Westbrook
.
nspw 2018
:
123-130
[doi]
Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution
Heather Vescent
,
Bob Blakley
.
nspw 2018
:
28-40
[doi]
2017
Proceedings of the 2017 New Security Paradigms Workshop, NSPW 2017, Santa Cruz, CA, USA, October 01-04, 2017
ACM,
2017.
[doi]
Market-based Security for Distributed Applications
George Bissias
,
Brian Neil Levine
,
Nikunj Kapadia
.
nspw 2017
:
19-34
[doi]
Beyond the pretty penny: the Economic Impact of Cybercrime
Carlos Hernandez Gañán
,
Michael Ciere
,
Michel van Eeten
.
nspw 2017
:
35-45
[doi]
Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World
Nick Merrill
,
Max T. Curran
,
John Chuang
.
nspw 2017
:
70-79
[doi]
Can I believe you?: Establishing Trust in Computer Mediated Introductions
Borke Obada-Obieh
,
Anil Somayaji
.
nspw 2017
:
94-106
[doi]
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing
Sean Peisert
,
Matt Bishop
,
Edward B. Talbot
.
nspw 2017
:
80-89
[doi]
Developer-centered security and the symmetry of ignorance
Olgierd Pieczul
,
Simon N. Foley
,
Mary Ellen Zurko
.
nspw 2017
:
46-56
[doi]
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact
Karen Renaud
,
Merrill Warkentin
.
nspw 2017
:
57-69
[doi]
End-to-End Passwords
Scott Ruoti
,
Kent E. Seamons
.
nspw 2017
:
107-121
[doi]
Practicing a Science of Security: A Philosophy of Science Perspective
Jonathan M. Spring
,
Tyler Moore
,
David J. Pym
.
nspw 2017
:
1-18
[doi]
The Third Wave?: Inclusive Privacy and Security
Yang Wang
.
nspw 2017
:
122-130
[doi]
Panel: Empirically-based Secure OS Design
Sam Weber
,
Adam Shostack
,
Jon A. Solworth
,
Mary Ellen Zurko
.
nspw 2017
:
90-93
[doi]
2016
Content-based security for the web
Alexander Afanasyev
,
J. Alex Halderman
,
Scott Ruoti
,
Kent E. Seamons
,
Yingdi Yu
,
Daniel Zappala
,
Lixia Zhang 0001
.
nspw 2016
:
49-60
[doi]
(TEEBAG)
Ranjbar A. Balisane
,
Andrew Martin
.
nspw 2016
:
61-67
[doi]
Rethinking operating system design: asymmetric multiprocessing for security and performance
Scott Brookes
,
Stephen Taylor
.
nspw 2016
:
68-79
[doi]
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security
Aokun Chen
,
Pratik Prabhanjan Brahma
,
Dapeng Oliver Wu
,
Natalie Ebner
,
Brandon Matthews
,
Jedidiah R. Crandall
,
Xuetao Wei
,
Michalis Faloutsos
,
Daniela Oliveira
.
nspw 2016
:
23-35
[doi]
Politikum: implications of security discourses for infrastructures
Laura Fichtner
,
Wolter Pieters
,
André Teixeira
.
nspw 2016
:
36-48
[doi]
Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016
Carrie Gates
,
Rainer Böhme
,
Mohammad Mannan
,
Serge Egelman
, editors,
ACM,
2016.
[doi]
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population
Hassan Halawa
,
Konstantin Beznosov
,
Yazan Boshmaf
,
Baris Coskun
,
Matei Ripeanu
,
Elizeu Santos-Neto
.
nspw 2016
:
11-22
[doi]
A case for the economics of secure software development
Chad Heitzenrater
,
Andrew C. Simpson
.
nspw 2016
:
92-105
[doi]
I'm not sure if we're okay: uncertainty for attackers and defenders
Mark E. Fioravanti II
,
Matt Bishop
,
Richard Ford
.
nspw 2016
:
1-10
[doi]
Searching for software diversity: attaining artificial diversity through program synthesis
Gilmore R. Lundquist
,
Vishwath Mohan
,
Kevin W. Hamlen
.
nspw 2016
:
80-91
[doi]
2015
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security
Zinaida Benenson
,
Gabriele Lenzini
,
Daniela Oliveira
,
Simon Parkin
,
Sven Uebelacker
.
nspw 2015
:
85-99
[doi]
Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors
Odette Beris
,
Adam Beautement
,
M. Angela Sasse
.
nspw 2015
:
73-84
[doi]
The Myth of the Average User: Improving Privacy and Security Systems through Individualization
Serge Egelman
,
Eyal Péer
.
nspw 2015
:
16-28
[doi]
Towards Managed Role Explosion
Aaron Elliott
,
Scott Knight
.
nspw 2015
:
100-111
[doi]
Choose Your Own Authentication
Alain Forget
,
Sonia Chiasson
,
Robert Biddle
.
nspw 2015
:
1-15
[doi]
Examining the Contribution of Critical Visualisation to Information Security
Peter Hall
,
Claude Heath
,
Lizzie Coles-Kemp
,
Axel Tanner
.
nspw 2015
:
59-72
[doi]
"If you were attacked, you'd be sorry": Counterfactuals as security arguments
Cormac Herley
,
Wolter Pieters
.
nspw 2015
:
112-123
[doi]
Milware: Identification and Implications of State Authored Malicious Software
Trey Herr
,
Eric Armbrust
.
nspw 2015
:
29-43
[doi]
Bridging the Trust Gap: Integrating Models of Behavior and Perception
Raquel Hill
,
Devan Ray Donaldson
.
nspw 2015
:
148-155
[doi]
Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security
Mohammad Mannan
,
Arash Shahkar
,
Atieh Saberi Pirouz
,
Vladimir Rabotka
.
nspw 2015
:
124-136
[doi]
WebSheets: Web Applications for Non-Programmers
Riccardo Pelizzi
,
R. Sekar
.
nspw 2015
:
137-147
[doi]
Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015
Anil Somayaji
,
Paul C. van Oorschot
,
Mohammad Mannan
,
Rainer Böhme
, editors,
ACM,
2015.
[doi]
Exploiting the Physical Environment for Securing the Internet of Things
Christian T. Zenger
,
Jan Zimmer
,
Mario Pietersz
,
Jan-Felix Posielek
,
Christof Paar
.
nspw 2015
:
44-58
[doi]
2014
Panel Summary: The Future of Software Regulation
Benjamin Edwards
,
Michael E. Locasto
,
Jeremy Epstein
.
nspw 2014
:
117-126
[doi]
Sign in
or
sign up
to see more results.