Cited By
View all- Das SKim TDabbish LHong J(2014)The effect of social influence on security sensitivityProceedings of the Tenth USENIX Conference on Usable Privacy and Security10.5555/3235838.3235851(143-157)Online publication date: 9-Jul-2014
- Almuhimedi HFelt AReeder RConsolvo S(2014)Your reputation precedes youProceedings of the Tenth USENIX Conference on Usable Privacy and Security10.5555/3235838.3235848(113-128)Online publication date: 9-Jul-2014
- Gates CChen JLi NProctor R(2014)Effective Risk Communication for Android AppsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2013.5811:3(252-265)Online publication date: 1-May-2014
- Show More Cited By