Jay Ligatti
Affiliations:- University of South Florida, Tampa, FL, USA
According to our database1,
Jay Ligatti
authored at least 42 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on csee.usf.edu
On csauthors.net:
Bibliography
2024
Toward satisfactory public accessibility: A crowdsourcing approach through online reviews to inclusive urban design.
CoRR, 2024
CoRR, 2024
Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL Concatenations.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the 9th International Conference on Software and Computer Applications, 2020
Proceedings of the 9th International Conference on Software and Computer Applications, 2020
An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems.
Proceedings of the 2020 ACM Southeast Conference, 2020
2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods.
Proceedings of the 12th International Conference on Human System Interaction, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2017
ACM Trans. Program. Lang. Syst., 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
Design of Adiabatic Dynamic Differential Logic for DPA-Resistant Secure Integrated Circuits.
IEEE Trans. Very Large Scale Integr. Syst., 2015
Int. J. Inf. Sec., 2015
Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2012
Pervasive Mob. Comput., 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012
2011
2010
Proceedings of the Computer Security, 2010
2009
ACM Trans. Softw. Eng. Methodol., 2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
2008
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
2007
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007
2006
Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, 2006
2005
Int. J. Inf. Sec., 2005
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005
Proceedings of the Formal Methods and Software Engineering, 2005
Proceedings of the Computer Security, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2003
Proceedings of the Eighth ACM SIGPLAN International Conference on Functional Programming, 2003
2002
Proceedings of the Software Security -- Theories and Systems, 2002