Zinaida Benenson
Orcid: 0009-0006-7158-0219Affiliations:
- University of Erlangen-Nuremberg, Germany
According to our database1,
Zinaida Benenson
authored at least 66 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
I Blame Apple in Part for My False Expectations: An Autoethnographic Study of Apple's Lockdown Mode in iOS.
CoRR, 2024
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 European Symposium on Usable Security, 2024
Used, Avoided, Restricted? Perceptions, Behavior, and Changes in Video Conferencing of German-speaking Users During and After the Pandemic.
Proceedings of the 2024 European Symposium on Usable Security, 2024
Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob".
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
"You're not smart enough for it. You can't do it anyway." - Experiences and Coping Strategies of Female System Administrators.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations.
Digit. Investig., 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2020
Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective.
Proc. Priv. Enhancing Technol., 2020
Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit.
Inform. Spektrum, 2019
Dagstuhl Reports, 2019
Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View.
Proceedings of the 2nd International Conference on Machine Learning and Machine Intelligence, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Mensch und Computer 2017, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems.
CoRR, 2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
Differences between Android and iPhone Users in Their Security and Privacy Awareness.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014
2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012
2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze).
it Inf. Technol., 2010
Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption.
Ad Hoc Sens. Wirel. Networks, 2010
2009
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009
2008
Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
Proceedings of the Computer Security, 2006
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the ARCS 2006, 2006
2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Simple Evasive Data Storage in Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
2004
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004