Mohamed Shehab
Orcid: 0000-0002-4189-9118
According to our database1,
Mohamed Shehab
authored at least 96 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Exploring End Users' Perceptions of Smart Lock Automation Within the Smart Home Environment.
Proceedings of the 2024 European Symposium on Usable Security, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Future Internet, 2023
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
I Have No Idea What Are These Terms! Exploring Users' Understanding and Interpretation of Genealogy Results.
Proceedings of the HCI International 2023 Posters, 2023
2022
"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
2021
Future Internet, 2021
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework.
Future Gener. Comput. Syst., 2021
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021
2020
Proceedings of the HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies, 2020
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study.
CoRR, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019
2018
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence.
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018
2017
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2017
Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions.
Proc. Priv. Enhancing Technol., 2017
Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Soc. Netw. Anal. Min., 2016
Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity.
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016
Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook.
Proceedings of the Data Privacy Management and Security Assurance, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
2015
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, 2014
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014
Proceedings of the 2014 Workshop on Eclipse Technology eXchange, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Knowl. Data Eng., 2013
Int. J. Inf. Sec., 2013
Proceedings of the 2013 World Congress on Internet Security, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
J. Comput. Secur., 2012
Comput. Secur., 2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
Proceedings of the Database and Expert Systems Applications, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation.
IEEE Trans. Serv. Comput., 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
iLayer: Toward an Application Access Control Framework for Content Management Systems.
Proceedings of the POLICY 2011, 2011
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
IEEE Trans. Knowl. Data Eng., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Proceedings P2P'08, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
ACM Trans. Internet Techn., 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
2006
2005
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005