• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20122019

Research output per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2019

    An observational investigation of reverse engineers' processes and mental models

    Votipka, D., Rabin, S., Micinski, K., Foster, J. S. & Mazurek, M. L., May 2 2019, CHI EA 2019 - Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 3313040. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • User comfort with android background resource accesses in different contexts

    Votipka, D., Rabin, S. M., Micinski, K., Gilray, T., Mazurek, M. M. & Foster, J. S., 2019, Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. USENIX Association, p. 235-250 16 p. (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2017

    User interactions and permission use on android

    Micinski, K., Votipka, D., Stevens, R., Kofinas, N., Mazurek, M. L. & Foster, J. S., May 2 2017, CHI 2017 - Proceedings of the 2017 ACM SIGCHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire. Association for Computing Machinery, p. 362-373 12 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2017-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Scopus citations
  • 2015

    Checking interaction-based declassification policies for android using symbolic execution

    Micinski, K., Fetter-Degges, J., Jeon, J., Foster, J. S. & Clarkson, M. R., Jan 1 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer Verlag, p. 520-538 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2014

    Temporal logics for hyperproperties

    Clarkson, M. R., Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N. & Sánchez, C., 2014, Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Proceedings. Springer Verlag, p. 265-284 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8414 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    83 Scopus citations
  • 2013

    Distributed cooperative caching in social wireless networks

    Taghizadeh, M., Micinski, K., Biswas, S., Ofria, C. & Torng, E., May 7 2013, In : IEEE Transactions on Mobile Computing. 12, 6, p. 1037-1053 17 p., 6175019.

    Research output: Contribution to journalArticlepeer-review

    82 Scopus citations
  • 2012

    Dr. android and Mr. hide: Fine-grained permissions in android applications

    Jeon, J., Micinski, K. K., Vaughan, J. A., Fogel, A., Reddy, N., Foster, J. S. & Millstein, T., Nov 27 2012, SPSM'12 - Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices. p. 3-14 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    130 Scopus citations