Ildar Muslukhov
Title
Cited by
Cited by
Year
The socialbot network: when bots socialize for fame and money
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Proceedings of the 27th Annual Computer Security Applications Conference, 93-102, 2011
4862011
Does my password go up to eleven? The impact of password meters on password selection
S Egelman, A Sotirakopoulos, I Muslukhov, K Beznosov, C Herley
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2013
1982013
Design and analysis of a social botnet
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Computer Networks 57 (2), 556-578, 2013
1862013
What makes users refuse web single sign-on? An empirical investigation of OpenID
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-20, 2011
992011
Understanding Users’ Requirements for Data Protection in Smartphones
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
ICDE Workshop, 8, 2012
872012
Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders
I Muslukhov, Y Boshmaf, C Kuo, J Lester, K Beznosov
15th International Conference on Human-Computer Interaction with Mobile …, 2013
782013
Key challenges in defending against malicious socialbots
Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu
Presented as part of the 5th {USENIX} Workshop on Large-Scale Exploits and …, 2012
582012
On the Impact of Touch {ID} on iPhone Passcodes
I Cherapau, I Muslukhov, N Asanka, K Beznosov
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 257-276, 2015
532015
Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
ACM Transactions on Internet Technology (TOIT) 13 (1), 1-35, 2013
272013
Snooping on mobile phones: Prevalence and trends
D Marques, I Muslukhov, T Guerreiro, L Carriço, K Beznosov
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 159-174, 2016
252016
Android users in the wild: Their authentication and usage behavior
A Mahfouz, I Muslukhov, K Beznosov
Pervasive and Mobile Computing 32, 50-61, 2016
142016
Survey: Data protection in smartphones against physical threats
I Muslukhov
Term Project Papers on Mobile Security. University of British Columbia, 2012
92012
OpenID-enabled browser: towards usable and secure web single sign-on
ST Sun, E Pospisil, I Muslukhov, N Dindar, K Hawkey, K Beznosov
CHI'11 Extended Abstracts on Human Factors in Computing Systems, 1291-1296, 2011
92011
Бортовые алгоритмы контроля параметров ГТД на основе технологии нейронных сетей
ВИ Васильев, СВ Жернаков, ИИ Муслухов
Вестник Уфимского государственного авиационного технического университета 12 (1), 2009
82009
Source attribution of cryptographic API misuse in android applications
I Muslukhov, Y Boshmaf, K Beznosov
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
72018
Enhanced security authentication methods, systems and media
A Csinger, I Muslukhov, H Khosravi, PT Luong
US Patent 10,509,898, 2019
62019
Decoupling data-at-rest encryption and smartphone locking with wearable devices
I Muslukhov, ST Sun, P Wijesekera, Y Boshmaf, K Beznosov
Pervasive and Mobile Computing 32, 26-34, 2016
42016
Задача контроля информационных каналов авиационного ГТД в бортовых условиях
СВ Жернаков
Вестник Самарского государственного аэрокосмического университета им …, 2006
42006
Towards Understanding the Link Between Age and Smartphone Authentication
L Qiu, A De Luca, I Muslukhov, K Beznosov
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
22019
EXT4 Encryption Design Document (public version)
M Halcrow, U Savagaonkar, T Ts’o, I Muslukhov
Google Technical Report, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20