Browse By Person: Al Fayyadh, Bander
|Up a level|
Group by: Item Type | Date
Jump to: Conference Paper
Number of items: 5.
Al Fayyadh, Bander, AlZomai, Mohammed, & Josang, Audun (2013) Firewalls usability: An experiment investigating the usability of personal firewalls. In Hof, H-J & Westphall, C (Eds.) Proceedings of the 7th International Conference on Emerging Security Information, Systems and Technologies, 25 - 31 August, 2013, Spain.
Al Fayyadh, Bander, Ponting, James, Alzomai, Mohammed, & Josang, Audun (2010) Vulnerabilities in personal firewalls caused by poor security usability. In Fan, P & Yuan, D (Eds.) Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security, 17-19 December 2010, China.
Al Fayyadh, Bander & Josang, Audun (2008) Robust WYSIWYS: A method of ensuring that what you see is what you sign. In Brankovic, L & Miller, M (Eds.) Information Security 2008, 22-25 January 2008, Australia, New South Wales, Wollongong.
Alzomai, Mohammed, Al Fayyadh, Bander, Josang, Audun, & McCullagh, Adrian (2008) An experimental investigation of the usability of transaction authorization in online bank security systems. In Brankovic, L & Miller, M (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), 22-25 January 2008, Australia, New South Wales, Wollongong.
Josang, Audun, Al Fayyadh, Bander, Grandison, Tyrone, Alzomai, Mohammed, & McNamara, Judith (2007) Security usability principles for vulnerability analysis and risk assessment. In 23rd Annual Computer Security Application Conference, 10-14 December 2007, Miami Beach, Florida.