Biometric authentication on a mobile device: a study of user effort, error and task disruption S Trewin, C Swart, L Koved, J Martino, K Singh, S Ben-David Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 171 | 2012 |
Protection of user data in hosted application environments M Christodorescu, D Pendarakis, KK Singh US Patent 9,245,126, 2016 | 125 | 2016 |
Evaluating bluetooth as a medium for botnet command and control K Singh, S Sangal, N Jain, P Traynor, W Lee International Conference on Detection of Intrusions and Malware, and …, 2010 | 119 | 2010 |
xBook: Redesigning Privacy Control in Social Networking Platforms. K Singh, S Bhola, W Lee USENIX Security Symposium, 249-266, 2009 | 109 | 2009 |
On the incoherencies in web browser access control policies K Singh, A Moshchuk, HJ Wang, W Lee 2010 IEEE Symposium on Security and Privacy, 463-478, 2010 | 94 | 2010 |
APHIDS: A mobile agent-based programmable hybrid intrusion detection system K Deeter, K Singh, S Wilson, L Filipozzi, S Vuong International Workshop on Mobile Agents for Telecommunication Applications …, 2004 | 51 | 2004 |
Trust/value/risk-based access control policy P Cheng, L Koved, KK Singh US Patent 9,432,375, 2016 | 49 | 2016 |
Evaluating email’s feasibility for botnet command and control K Singh, A Srivastava, J Giffin, W Lee 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 44 | 2008 |
Mobile telephone featuring accelerated ambient temperature measurement module S Soini, M Simonen, T Tammi US Patent 7,027,834, 2006 | 42 | 2006 |
Practical context-aware permission control for hybrid mobile applications K Singh International Workshop on Recent Advances in Intrusion Detection, 307-327, 2013 | 39 | 2013 |
Adaptive behavior profiling and anomaly scoring through continuous learning P Cheng, L Koved, KK Singh US Patent 9,807,105, 2017 | 38 | 2017 |
VulnerableMe: Measuring systemic weaknesses in mobile browser security C Amrutkar, K Singh, A Verma, P Traynor International Conference on Information Systems Security, 16-34, 2012 | 34 | 2012 |
Understanding precision in host based intrusion detection M Sharif, K Singh, J Giffin, W Lee International Workshop on Recent Advances in Intrusion Detection, 21-41, 2007 | 34 | 2007 |
Context-aware permission control of hybrid mobile applications KK Singh US Patent 9,275,221, 2016 | 33 | 2016 |
Policylint: Investigating internal privacy policy contradictions on google play B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ... 28th {USENIX} Security Symposium ({USENIX} Security 19), 585-602, 2019 | 26 | 2019 |
Practical end-to-end web content integrity K Singh, HJ Wang, A Moshchuk, C Jackson, W Lee Proceedings of the 21st international conference on World Wide Web, 659-668, 2012 | 24 | 2012 |
Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system S Chari, H Gunasinghe, HM Krawczyk, A Kundu, KK Singh, D Su US Patent 10,833,861, 2020 | 21 | 2020 |
UiRef: analysis of sensitive user inputs in Android applications B Andow, A Acharya, D Li, W Enck, K Singh, T Xie Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 20 | 2017 |
Webcapsule: Towards a lightweight forensic engine for web browsers C Neasbitt, B Li, R Perdisci, L Lu, K Singh, K Li Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 19 | 2015 |
Method and apparatus for server-side authentication and authorization for mobile clients without client-side application modification L Koved, KK Singh US Patent 9,088,555, 2015 | 18 | 2015 |