How secure are our computer systems courses? M Almansoori, J Lam, E Fang, K Mulligan, AG Soosai Raj, R Chatterjee Proceedings of the 2020 ACM conference on international computing education …, 2020 | 16 | 2020 |
Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse S Stephenson, M Almansoori, P Emami-Naeini, DY Huang, R Chatterjee 32nd USENIX Security Symposium (USENIX Security 23), 69-86, 2023 | 12 | 2023 |
Identifying gaps in the secure programming knowledge and skills of students J Lam, E Fang, M Almansoori, R Chatterjee, AG Soosai Raj Proceedings of the 53rd ACM Technical Symposium on Computer Science …, 2022 | 11 | 2022 |
" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse S Stephenson, M Almansoori, P Emami-Naeini, R Chatterjee 32nd USENIX Security Symposium (USENIX Security 23), 105-122, 2023 | 10 | 2023 |
A global survey of android dual-use applications used in intimate partner surveillance M Almansoori, A Gallardo, J Poveda, A Ahmed, R Chatterjee Proceedings on Privacy Enhancing Technologies, 2022 | 9 | 2022 |
Textbook underflow: Insufficient security discussions in textbooks used for computer systems courses M Almansoori, J Lam, E Fang, AG Soosai Raj, R Chatterjee Proceedings of the 52nd ACM technical symposium on computer science …, 2021 | 8 | 2021 |
Towards Finding the Missing Pieces to Teach Secure Programming Skills to Students M Almansoori, J Lam, E Fang, AG Soosai Raj, R Chatterjee Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023 | 1 | 2023 |
Analyzing Patterns and Behavior of Users When Assisting Victims of Tech-enabled Stalking N Ceccio, N Gupta, M Almansoori | | |