Scott Heidbrink

According to our database1, Scott Heidbrink authored at least 11 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Using Neural Architecture Search for Improving Software Flaw Detection in Multimodal Deep Learning Models.
CoRR, 2020

Multimodal Deep Learning for Flaw Detection in Software Programs.
CoRR, 2020

2019
A Usability Study of Four Secure Email Tools Using Paired Participants.
ACM Trans. Priv. Secur., 2019

2018
The Secure Socket API: TLS as an Operating System Service.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
Proceedings of the 26th USENIX Security Symposium, 2017

Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
CoRR, 2016

Social Authentication for End-to-End Encryption.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Johnny and Jane: Analyzing Secure Email Using Two Novice Users.
CoRR, 2015


  Loading...