Razieh Nokhbeh Zaeem
Orcid: 0000-0002-0415-5814Affiliations:
- The University of Texas at Austin, TX, USA
According to our database1,
Razieh Nokhbeh Zaeem
authored at least 37 papers
between 2010 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022
PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022
2021
ACM Trans. Manag. Inf. Syst., 2021
Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021
Enhancing constraint-based repair of data structure errors that recur using memoization.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Finding Trustworthy Users: Twitter Sentiment Towards US Presidential Candidates in 2016 and 2020.
Proceedings of the Intelligent Systems and Applications, 2021
Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools.
Proceedings of the 13th International Conference on Agents and Artificial Intelligence, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
PrivacyCheck's Machine Learning to Digest Privacy Policies: Competitor Analysis and Usage Patterns.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information.
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
An Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach.
Proceedings of the 12th International Conference on Agents and Artificial Intelligence, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft.
Proceedings of the Business Information Systems Workshops, 2020
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020
2019
It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter.
ACM Trans. Internet Techn., 2019
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes.
Proceedings of the European Intelligence and Security Informatics Conference, 2019
2018
ACM Trans. Internet Techn., 2018
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
Internet of Things: Securing the Identity by Analyzing Ecosystem Models of Devices and Organizations.
Proceedings of the 2018 AAAI Spring Symposia, 2018
2017
Modeling and analysis of identity threat behaviors through text mining of identity theft stories.
Comput. Secur., 2017
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
2016
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
2014
Proceedings of the 2014 International Symposium on Model Checking of Software, 2014
Automated Generation of Oracles for Testing User-Interaction Features of Mobile Apps.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
2013
Proceedings of the Runtime Verification - 4th International Conference, 2013
2012
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Improving the effectiveness of spectra-based fault localization using specifications.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012
2010
Proceedings of the ECOOP 2010, 2010
Proceedings of the Abstract State Machines, 2010