Hassan Khan
Cited by
Cited by
Itus: an implicit authentication framework for android
H Khan, A Atwater, U Hengartner
Proceedings of the 20th Annual International Conference on Mobile Computing …, 2014
Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying
H Khan, U Hengartner, D Vogel
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 225-239, 2015
Towards application-centric implicit authentication on smartphones
H Khan, U Hengartner
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
A comparative evaluation of implicit authentication schemes
H Khan, A Atwater, U Hengartner
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes
H Khan, U Hengartner, D Vogel
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane
R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ...
2012 European Workshop on Software Defined Networking, 79-84, 2012
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
Evaluating attack and defense strategies for smartphone pin shoulder surfing
H Khan, U Hengartner, D Vogel
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication
H Khan, U Hengartner, D Vogel
Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018
Automated anomaly detector adaptation using adaptive threshold tuning
MQ Ali, E Al-Shaer, H Khan, SA Khayam
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-30, 2013
Evaluating authentication options for mobile health applications in younger and older adults
K Grindrod, H Khan, U Hengartner, S Ong, AG Logan, D Vogel, R Gebotys, ...
PloS one 13 (1), 2018
What is the impact of p2p traffic on anomaly detection?
IU Haq, S Ali, H Khan, SA Khayam
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
Determining malicious executable distinguishing attributes and low-complexity detection
H Khan, F Mirza, SA Khayam
Journal in computer virology 7, 95-105, 2011
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Mimicry Attacks on Smartphone Keystroke Authentication
H Khan, U Hengartner, D Vogel
ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-34, 2020
Embedding a covert channel in active network connections
H Khan, Y Javed, F Mirza, SA Khayam
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel
H Khan, M Javed, F Mirza, SA Khayam
National University of Science & Technology (NUST), Islamabad 44000, 0
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones
L Agarwal, H Khan, U Hengartner
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond
H Khan, J Ceci, J Stegman, AJ Aviv, R Dara, R Kuber
Annual Computer Security Applications Conference, 249-262, 2020
Chaperone: Real-time locking and loss prevention for smartphones
J Chen, U Hengartner, H Khan, M Mannan
29th USENIX Security Symposium (USENIX Security 20), 325-342, 2020
The system can't perform the operation now. Try again later.
Articles 1–20