Følg
Noura N. Alomar
Titel
Citeret af
Citeret af
År
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
812017
" You've got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild
N Alomar, P Wijesekera, E Qiu, S Egelman
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 319-339, 2020
502020
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99, 519-535, 2017
492017
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
472017
Performance‐Based Comparative Assessment of Open Source Web Vulnerability Scanners
M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman
Security and Communication Networks 2017 (1), 6158107, 2017
462017
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
N Alomar, S Egelman
Proceedings on Privacy Enhancing Technologies, 2022
402022
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
352016
Behavioral consequences of Pokémon GO: the exaggerated picture
N Alomar, M Alsaleh, A Alarifi
Computers in Human Behavior 90, 223-245, 2019
292019
Human factors in the design and evaluation of bioinformatics tools
N Al-Ageel, A Al-Wabil, G Badr, N AlOmar
Procedia Manufacturing 3, 2003-2010, 2015
272015
The design of a hybrid cultural model for Arabic gamified systems
N Alomar, V Wanick, G Wills
Computers in human behavior 64, 472-485, 2016
252016
Usability engineering of agile software project management tools
N Alomar, N Almobarak, S Alkoblan, S Alhozaimy, S Alharbi
Design, User Experience, and Usability: Design Thinking and Methods: 5th …, 2016
202016
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts
N Alomar, M Alsaleh, A Alarifi
Computers & Security 85, 300-312, 2019
192019
A qualitative model of older adults’ contextual decision-making about information sharing
A Frik, J Bernd, N Alomar, S Egelman
Workshop on the Economics of Information Security (WEIS 2020), 2020
162020
Color image ray transform technique for detecting phishing web pages
AM Alhumaisan, MA Alsaleh, NN Alomar
US Patent App. 15/333,647, 2018
162018
Lessons in VCR repair: Compliance of android app developers with the california consumer privacy act (CCPA)
N Samarin, S Kothari, Z Siyed, O Bjorkman, R Yuan, P Wijesekera, ...
arXiv preprint arXiv:2304.00944, 2023
142023
Security and Privacy Failures in Popular {2FA} Apps
C Gilsenan, F Shakir, N Alomar, S Egelman
32nd USENIX Security Symposium (USENIX Security 23), 2079-2096, 2023
142023
Method and system for dynamically generating a hint to recall a password for a user account of a user
AS Alarifi, MA Alsaleh, NN Alomar
US Patent 10,440,008, 2019
62019
Method and system for managing a gamified trustee based social authentication to recover an account of a user
NN Alomar, MA Alsaleh
US Patent App. 15/259,047, 2018
52018
Decentralized backup and recovery of TOTP secrets
C Gilsenan, N Alomar, A Huang, S Egelman
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020
22020
Someone in your contact list: Cued recall-based textual passwords
N Alomar, M Alsaleh, A Alarifi
IEEE Transactions on Information Forensics and Security 12 (11), 2574-2589, 2017
22017
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20