Joseph Hallett

Orcid: 0000-0002-6146-9852

According to our database1, Joseph Hallett authored at least 23 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RTFM: How hard are IoT platform providers making it for their developers?
CoRR, 2024

Saltzer & Schroeder for 2030: Security engineering principles in a world of AI.
CoRR, 2024

Sandboxing Adoption in Open Source Ecosystems.
Proceedings of the 12th ACM/IEEE International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems, 2024

Super Mario in the Pernicious Kingdoms Classifying Glitches in Old Games.
Proceedings of the 8th IEEE/ACM International Workshop on Games and Software Engineering, 2024

2023
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations.
ACM Trans. Softw. Eng. Methodol., May, 2023

Decisions & Disruptions 2: Decide Harder.
CoRR, 2023

2022
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups.
IEEE Trans. Software Eng., 2022

The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers.
IEEE Trans. Software Eng., 2022

The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study.
IEEE Secur. Priv., 2022

How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces.
CoRR, 2022

Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2022

2021
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations.
CoRR, 2021

Developers Are Neither Enemies Nor Users: They Are Collaborators.
Proceedings of the IEEE Secure Development Conference, 2021

"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
SLR_Dataset.
Dataset, December, 2020

"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making.
ACM Trans. Priv. Secur., 2020

Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education.
IEEE Secur. Priv., 2020

2019
Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Capturing mobile security policies precisely
PhD thesis, 2018

Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

2017
Capturing Policies for BYOD.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2016
AppPAL for Android - Capturing and Checking Mobile App Policies.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2014
Towards an Authorization Framework for App Security Checking.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014


  Loading...