Seguir
Su Mon Kywe
Su Mon Kywe
Security Architect
E-mail confirmado em sc.com
Título
Citado por
Citado por
Ano
On Recommending Hashtags in Twitter Networks
SM Kywe, TA Hoang, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
2092012
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
1712015
A Survey of Recommender Systems in Twitter
SM Kywe, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
1262012
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
International Conference on Applied Cryptography and Network Security, 272-289, 2013
352013
Detecting camouflaged applications on mobile application markets
SM Kywe, Y Li, RH Deng, J Hong
International Conference on Information Security and Cryptology, 241-254, 2014
202014
Batch Clone Detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
182014
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 147-156, 2016
172016
Security Issues of In-Store Mobile Payment
X Yu, SM Kywe, Y Li
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2, 115-144, 2017
162017
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
152012
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
92014
Poster: Usability Analysis of Biometric Authentication Systems on Mobile Phones
K Iacovino, SM Kywe, LF Cranor, B Ur
9*
Dissecting developer policy violating apps: characterization and detection
SM Kywe, Y Li, J Hong, C Yao
Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016
72016
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service
SM Kywe, Y Li, J Shi
RFID-Technologies and Applications (RFID-TA), 2013 IEEE International …, 2013
52013
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
MK SU
Singapore Management University, 2016
2016
ENVIRONMENTAL MANAGEMENT STUDY IN CENTRAL MYANMAR
S Wynn, SM Kywe, W Maung
Selected Student Research Projects of the 5th Search for SEAMEO Young …, 0
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–15