Browse By Person: Al Fayyadh, Bander

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 5.

Conference Paper

Al Fayyadh, Bander, AlZomai, Mohammed, & Josang, Audun (2013) Firewalls usability: An experiment investigating the usability of personal firewalls. In Hof, H-J & Westphall, C (Eds.) Proceedings of the 7th International Conference on Emerging Security Information, Systems and Technologies, 25 - 31 August, 2013, Spain.

Al Fayyadh, Bander, Ponting, James, Alzomai, Mohammed, & Josang, Audun (2010) Vulnerabilities in personal firewalls caused by poor security usability. In Fan, P & Yuan, D (Eds.) Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security, 17-19 December 2010, China.

Al Fayyadh, Bander & Josang, Audun (2008) Robust WYSIWYS: A method of ensuring that what you see is what you sign. In Brankovic, L & Miller, M (Eds.) Information Security 2008, 22-25 January 2008, Australia, New South Wales, Wollongong.

Alzomai, Mohammed, Al Fayyadh, Bander, Josang, Audun, & McCullagh, Adrian (2008) An experimental investigation of the usability of transaction authorization in online bank security systems. In Brankovic, L & Miller, M (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), 22-25 January 2008, Australia, New South Wales, Wollongong.

Josang, Audun, Al Fayyadh, Bander, Grandison, Tyrone, Alzomai, Mohammed, & McNamara, Judith (2007) Security usability principles for vulnerability analysis and risk assessment. In 23rd Annual Computer Security Application Conference, 10-14 December 2007, Miami Beach, Florida.
Number of full-text downloads 504
Number of citations in Scopus 7
Number of citations in Web of ScienceĀ® 1

This list was generated on Sat Feb 28 05:55:25 2015 AEST.