Folgen
Ashwini Rao
Ashwini Rao
Eydle Inc.
Bestätigte E-Mail-Adresse bei eydle.com
Titel
Zitiert von
Zitiert von
Jahr
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
TD Breaux, H Hibshi, A Rao
Requirements Engineering 19 (3), 281-307, 2014
1092014
Expecting the unexpected: Understanding mismatched privacy expectations online
A Rao, F Schaub, N Sadeh, A Acquisti, R Kang
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 77-96, 2016
912016
What do they know about me? Contents and Concerns of Online Behavioral Profiles
A Rao, F Schaub, N Sadeh
PASSAT 2014: International Conference on Information Privacy, Security, Risk …, 2015
79*2015
Effect of grammar on security of long passwords
A Rao, B Jha, G Kini
Proceedings of the third ACM conference on Data and application security and …, 2013
762013
Formal analysis of privacy requirements specifications for multi-tier applications
TD Breaux, A Rao
2013 21st IEEE International Requirements Engineering Conference (RE), 14-23, 2013
472013
Privacy and behavioral advertising: Towards meeting users’ preferences
PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh
Symposium on usable privacy and security (SOUPS), 22-24, 2015
252015
Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach
I Ruchkin, A Rao, D De Niz, S Chaki, D Garlan
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
212015
Towards usable privacy policies: Semi-automatically extracting data practices from websites’ privacy policies
N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, J Reidenberg, ...
Symposium on Usable Privacy and Security (SOUPS), 2014
202014
Why people are (un) willing to share information with online advertisers
PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh
Technical report CMU-ISR-15-106, 2015
172015
Smartphone fingerprint authentication versus pins: a usability study
S Karthikeyan, S Feng, A Rao, N Sadeh
ed: Carnegie Mellon University Technical Reports:, 14-012, 2014
142014
Less is more? investigating the role of examples in security studies using analogical transfer
A Rao, H Hibshi, T Breaux, JM Lehker, J Niu
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014
62014
Distributed deep learning using volunteer computing-like paradigm
M Atre, B Jha, A Rao
2021 IEEE International Parallel and Distributed Processing Symposium …, 2021
52021
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
TD Breaux, H Hibshi, A Rao, JM Lehker
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012
42012
Data siphoning across borders: The role of internet tracking
A Rao, J Pfeffer
2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019
32019
Types of privacy expectations
A Rao, J Pfeffer
Frontiers in big Data 3, 7, 2020
22020
Assessing the impact of data practices on user privacy
A Rao
Technische Universität München, 2018
22018
Managing Risk in Mobile Applications With Formal Security Policies
T Breaux, A Rao
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2013
22013
Detecting Cloud-Based Phishing Attacks by Combining Deep Learning Models
M Atre, B Jha, A Rao
arXiv preprint arXiv:2204.02446, 2022
2022
Security Implications of Induced Earthquakes
A Rao, B Jha
2016 AGU Fall Meeting, 2016
2016
Security Implications of Induced Earthquakes
B Jha, A Rao
AGU Fall Meeting Abstracts 2016, S31B-2768, 2016
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20