Cited By
View all- Malisa LKostiainen KCapkun SAhn GPretschner AGhinita G(2017)Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity PerceptionProceedings of the Seventh ACM on Conference on Data and Application Security and Privacy10.1145/3029806.3029819(289-300)Online publication date: 22-Mar-2017
- Marforio CMasti RSoriente CKostiainen KCapkun SLu LMannan M(2016)Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile BankingProceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices10.1145/2994459.2994462(83-92)Online publication date: 24-Oct-2016
- Marforio CJayaram Masti RSoriente CKostiainen KČapkun SKaye JDruin ALampe CMorris DHourcade J(2016)Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone ApplicationsProceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858085(540-551)Online publication date: 7-May-2016
- Show More Cited By