Manar Mohamed
Orcid: 0000-0001-5342-0744
According to our database1,
Manar Mohamed
authored at least 16 papers
between 2013 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2017
IEEE Trans. Inf. Forensics Secur., 2017
J. Comput. Secur., 2017
2016
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics.
CoRR, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
CoRR, 2013