Su Mon Kywe
Su Mon Kywe
Assistant Manager (Information Security)
Geverifieerd e-mailadres voor singaporeair.com.sg
Titel
Geciteerd door
Geciteerd door
Jaar
On Recommending Hashtags in Twitter Networks
SM Kywe, TA Hoang, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
1782012
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
1142015
A Survey of Recommender Systems in Twitter
SM Kywe, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
962012
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
International Conference on Applied Cryptography and Network Security, 272-289, 2013
322013
Detecting camouflaged applications on mobile application markets
SM Kywe, Y Li, RH Deng, J Hong
International Conference on Information Security and Cryptology, 241-254, 2014
172014
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 147-156, 2016
142016
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
142012
Batch Clone Detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
92014
Poster: Usability Analysis of Biometric Authentication Systems on Mobile Phones
K Iacovino, SM Kywe, LF Cranor, B Ur
8*
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
72014
Security Issues of In-Store Mobile Payment
X Yu, SM Kywe, Y Li
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2, 115-144, 2017
62017
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service
SM Kywe, Y Li, J Shi
RFID-Technologies and Applications (RFID-TA), 2013 IEEE International …, 2013
52013
Dissecting developer policy violating apps: characterization and detection
SM Kywe, Y Li, J Hong, C Yao
Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016
32016
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
MK SU
Singapore Management University, 2016
2016
ENVIRONMENTAL MANAGEMENT STUDY IN CENTRAL MYANMAR
S Wynn, SM Kywe, W Maung
Selected Student Research Projects of the 5th Search for SEAMEO Young …, 0
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–15