Heather Crawford

Orcid: 0000-0001-6267-6303

Affiliations:
  • Florida Institute of Technology, Melbourne, FL, USA
  • University of Glasgow, UK


According to our database1, Heather Crawford authored at least 15 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2018
Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Using image saliency and regions of interest to encourage stronger graphical passwords.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2014
Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.
Int. J. Mob. Hum. Comput. Interact., 2014

2013
A framework for continuous, transparent mobile device authentication.
Comput. Secur., 2013

Assured Supraliminal Steganography in Computer Games.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

U-PriSM 2: the second usable privacy and security for mobile devices workshop.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

2012
A framework for continuous, transparent authentication on mobile devices.
PhD thesis, 2012

2010
Keystroke dynamics: Characteristics and opportunities.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Invisible, Passive, Continuous and Multimodal Authentication.
Proceedings of the Mobile Social Signal Processing - First International Workshop, 2010

2009
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
Proceedings of the Information Hiding, 11th International Workshop, 2009

A Multi-Agent Approach to Testing Anti-Spam Software.
Proceedings of the Database and Expert Systems Applications, 2009

2008
Kwyjibo: automatic domain name generation.
Softw. Pract. Exp., 2008

Spamulator: the Internet on a laptop.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008


  Loading...