Joshua Reynolds

According to our database1, Joshua Reynolds authored at least 9 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Machine Learning Based Object Tracking.
CoRR, 2024

2022
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations.
Proceedings of the Computer Security - ESORICS 2022, 2022

2020
Empirical Measurement of Systemic 2FA Usability.
Proceedings of the 29th USENIX Security Symposium, 2020

Measuring Identity Confusion with Uniform Resource Locators.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
The Impact of Secure Transport Protocols on Phishing Efficacy.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

2018
A Tale of Two Studies: The Best and Worst of YubiKey Usability.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
Proceedings of the 26th USENIX Security Symposium, 2017

2015
Using computational swarm intelligence for real-time asset allocation.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

2002
Internationalized Back-of-the-Book Indexes for XSL Formatting Objects.
Proceedings of the Extreme Markup Languages® 2002 Conference, 2002


  Loading...