Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods M Alsaleh, N Alomar, A Alarifi PloS one 12 (3), e0173284, 2017 | 81 | 2017 |
" You've got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild N Alomar, P Wijesekera, E Qiu, S Egelman Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 319-339, 2020 | 51 | 2020 |
A model for evaluating the security and usability of e-banking platforms A Alarifi, M Alsaleh, N Alomar Computing 99, 519-535, 2017 | 49 | 2017 |
Social authentication applications, attacks, defense strategies and future research directions: a systematic review N Alomar, M Alsaleh, A Alarifi IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017 | 47 | 2017 |
Performance‐Based Comparative Assessment of Open Source Web Vulnerability Scanners M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman Security and Communication Networks 2017 (1), 6158107, 2017 | 46 | 2017 |
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps N Alomar, S Egelman Proceedings on Privacy Enhancing Technologies, 2022 | 40 | 2022 |
SECDEP: Software engineering curricula development and evaluation process using SWEBOK A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh Information and Software Technology 74, 114-126, 2016 | 35 | 2016 |
Behavioral consequences of Pokémon GO: the exaggerated picture N Alomar, M Alsaleh, A Alarifi Computers in Human Behavior 90, 223-245, 2019 | 29 | 2019 |
Human factors in the design and evaluation of bioinformatics tools N Al-Ageel, A Al-Wabil, G Badr, N AlOmar Procedia Manufacturing 3, 2003-2010, 2015 | 27 | 2015 |
The design of a hybrid cultural model for Arabic gamified systems N Alomar, V Wanick, G Wills Computers in human behavior 64, 472-485, 2016 | 25 | 2016 |
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts N Alomar, M Alsaleh, A Alarifi Computers & Security 85, 300-312, 2019 | 19 | 2019 |
Usability engineering of agile software project management tools N Alomar, N Almobarak, S Alkoblan, S Alhozaimy, S Alharbi Design, User Experience, and Usability: Design Thinking and Methods: 5th …, 2016 | 19 | 2016 |
Color image ray transform technique for detecting phishing web pages AM Alhumaisan, MA Alsaleh, NN Alomar US Patent App. 15/333,647, 2018 | 18 | 2018 |
A qualitative model of older adults’ contextual decision-making about information sharing A Frik, J Bernd, N Alomar, S Egelman Workshop on the Economics of Information Security (WEIS 2020), 2020 | 16 | 2020 |
Lessons in VCR repair: Compliance of android app developers with the california consumer privacy act (CCPA) N Samarin, S Kothari, Z Siyed, O Bjorkman, R Yuan, P Wijesekera, ... arXiv preprint arXiv:2304.00944, 2023 | 14 | 2023 |
Security and Privacy Failures in Popular {2FA} Apps C Gilsenan, F Shakir, N Alomar, S Egelman 32nd USENIX Security Symposium (USENIX Security 23), 2079-2096, 2023 | 14 | 2023 |
Method and system for dynamically generating a hint to recall a password for a user account of a user AS Alarifi, MA Alsaleh, NN Alomar US Patent 10,440,008, 2019 | 6 | 2019 |
Method and system for managing a gamified trustee based social authentication to recover an account of a user NN Alomar, MA Alsaleh US Patent App. 15/259,047, 2018 | 6 | 2018 |
Decentralized backup and recovery of TOTP secrets C Gilsenan, N Alomar, A Huang, S Egelman Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020 | 2 | 2020 |
Someone in your contact list: Cued recall-based textual passwords N Alomar, M Alsaleh, A Alarifi IEEE Transactions on Information Forensics and Security 12 (11), 2574-2589, 2017 | 2 | 2017 |