HomeSnitch: Behavior transparency and control for smart home IoT devices TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi Proceedings of the 12th conference on security and privacy in wireless and …, 2019 | 155 | 2019 |
The aftermath of a crypto-ransomware attack at a large academic institution L Zhang-Kennedy, H Assal, J Rocheleau, R Mohamed, K Baig, ... 27th USENIX Security Symposium (USENIX Security 18), 1061-1078, 2018 | 42 | 2018 |
{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks P Rieger, M Chilese, R Mohamed, M Miettinen, H Fereidooni, AR Sadeghi 32nd USENIX Security Symposium (USENIX Security 23), 4301-4318, 2023 | 25 | 2023 |
" I'm hoping they're an ethical company that won't do anything that I'll regret" Users Perceptions of At-home DNA Testing Companies K Baig, R Mohamed, AL Theus, S Chiasson Proceedings of the 2020 CHI conference on human factors in computing systems …, 2020 | 25 | 2020 |
Online privacy and aging of digital artifacts RE Mohamed, S Chiasson Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 177-195, 2018 | 14 | 2018 |
A framework for emergency-evacuation planning using GIS and DSS RE Mohamed, E Kosba, K Mahar, S Mesbah Information Fusion and Intelligent Geographic Information Systems (IF&IGIS …, 2018 | 12 | 2018 |
{LocIn}: Inferring Semantic Location from Spatial Maps in Mixed Reality H Farrukh, R Mohamed, A Nare, A Bianchi, ZB Celik 32nd USENIX Security Symposium (USENIX Security 23), 877-894, 2023 | 11 | 2023 |
Istelan: Disclosing sensitive user information by mobile magnetometer from finger touches R Mohamed, H Farrukh, Y Lu, H Wang, ZB Celik Proceedings on Privacy Enhancing Technologies, 2023 | 9 | 2023 |
When private and professional lives meet: The impact of digital footprints on employees and political candidates RE Mohamed, TB Idalino, S Chiasson Proceedings of the 8th International Conference on Social Media & Society, 1-5, 2017 | 7 | 2017 |
The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions R Mohamed, P Chametka, S Chiasson Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 6 | 2020 |
HONEYSCOPE: IoT device protection with deceptive network views R Mohamed, T O’Connor, M Miettinen, W Enck, AR Sadeghi Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019 | 5 | 2019 |
A GIS-based DSS for evacuation planning R Ebada, S Mesbah, E Kosba, K Mahar 2012 22nd International Conference on Computer Theory and Applications …, 2012 | 3 | 2012 |
{ATTention} Please! An Investigation of the App Tracking Transparency Permission R Mohamed, A Arunasalam, H Farrukh, J Tong, A Bianchi, ZB Celik 33rd USENIX Security Symposium (USENIX Security 24), 5017-5034, 2024 | 2 | 2024 |
Investigating Decay Representations for Privacy and Online Reputation Management R Mohamed Carleton University, 2019 | | 2019 |