Itus: an implicit authentication framework for android H Khan, A Atwater, U Hengartner Proceedings of the 20th Annual International Conference on Mobile Computing …, 2014 | 114 | 2014 |
Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying H Khan, U Hengartner, D Vogel Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 225-239, 2015 | 103 | 2015 |
Towards application-centric implicit authentication on smartphones H Khan, U Hengartner Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014 | 85 | 2014 |
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes H Khan, U Hengartner, D Vogel Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 65 | 2016 |
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ... 2012 European Workshop on Software Defined Networking, 79-84, 2012 | 65 | 2012 |
A comparative evaluation of implicit authentication schemes H Khan, A Atwater, U Hengartner Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 61 | 2014 |
Designing a cluster-based covert channel to evade disk investigation and forensics H Khan, M Javed, SA Khayam, F Mirza Computers & Security 30 (1), 35-49, 2011 | 59 | 2011 |
Evaluating attack and defense strategies for smartphone pin shoulder surfing H Khan, U Hengartner, D Vogel Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018 | 56 | 2018 |
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication H Khan, U Hengartner, D Vogel Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018 | 45 | 2018 |
Automated anomaly detector adaptation using adaptive threshold tuning MQ Ali, E Al-Shaer, H Khan, SA Khayam ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-30, 2013 | 41 | 2013 |
Evaluating authentication options for mobile health applications in younger and older adults K Grindrod, H Khan, U Hengartner, S Ong, AG Logan, D Vogel, R Gebotys, ... PloS one 13 (1), 2018 | 35 | 2018 |
What is the impact of p2p traffic on anomaly detection? IU Haq, S Ali, H Khan, SA Khayam Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 29 | 2010 |
Determining malicious executable distinguishing attributes and low-complexity detection H Khan, F Mirza, SA Khayam Journal in computer virology 7, 95-105, 2011 | 25 | 2011 |
Mimicry Attacks on Smartphone Keystroke Authentication H Khan, U Hengartner, D Vogel ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-34, 2020 | 21 | 2020 |
On achieving good operating points on an ROC plane using stochastic anomaly score prediction MQ Ali, H Khan, A Sajjad, SA Khayam Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 18 | 2009 |
Embedding a covert channel in active network connections H Khan, Y Javed, F Mirza, SA Khayam Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009 | 16 | 2009 |
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel H Khan, M Javed, F Mirza, SA Khayam National University of Science & Technology (NUST), Islamabad 44000, 0 | 15* | |
Concerned but ineffective: User perceptions, methods, and challenges when sanitizing old devices for disposal J Ceci, H Khan, U Hengartner, D Vogel Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 455-474, 2021 | 12 | 2021 |
Widely reused and shared, infrequently updated, and sometimes inherited: A holistic view of pin authentication in digital lives and beyond H Khan, J Ceci, J Stegman, AJ Aviv, R Dara, R Kuber Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 12 | 2020 |
Chaperone: Real-time locking and loss prevention for smartphones J Chen, U Hengartner, H Khan, M Mannan 29th USENIX Security Symposium (USENIX Security 20), 325-342, 2020 | 12 | 2020 |