Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Privacy threats in intimate relationships
K Levy, B Schneier - Journal of Cybersecurity, 2020 - academic.oup.com
This article provides an overview of intimate threats: a class of privacy threats that can arise
within our families, romantic partnerships, close friendships, and caregiving relationships …
within our families, romantic partnerships, close friendships, and caregiving relationships …
A deep dive into user's preferences and behavior around mobile phone sharing
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums
A growing body of research suggests that intimate partner abusers use digital technologies
to surveil their partners, including by installing spyware apps, compromising devices and …
to surveil their partners, including by installing spyware apps, compromising devices and …
PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …
presence of a bystander using the phone's front-facing camera. However, a person's face in …
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems
Smart devices are commonly used in multi-user scenarios, such as shared household
devices and shared corporate devices for front-line workers. A multi-user device requires …
devices and shared corporate devices for front-line workers. A multi-user device requires …
No privacy in the electronics repair industry
J Ceci, J Stegman, H Khan - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
Electronics repair and service providers offer a range of services to computing device
owners across North America—from software installation to hardware repair. Device owners …
owners across North America—from software installation to hardware repair. Device owners …
Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users' daily lives
Thermal attacks refer to the possibility of capturing heat traces that result from interacting
with user interfaces to reveal sensitive input, such as passwords. The technical feasibility …
with user interfaces to reveal sensitive input, such as passwords. The technical feasibility …
Normal and easy: Account sharing practices in the workplace
Work is being digitized across all sectors, and digital account sharing has become common
in the workplace. In this paper, we conduct a qualitative and quantitative study of digital …
in the workplace. In this paper, we conduct a qualitative and quantitative study of digital …
Understanding shoulder surfer behavior and attack patterns using virtual reality
In this work, we explore attacker behavior during shoulder surfing. As such behavior is often
opportunistic and difficult to observe in real world settings, we leverage the capabilities of …
opportunistic and difficult to observe in real world settings, we leverage the capabilities of …