Marko Helenius

Orcid: 0000-0002-3218-0320

According to our database1, Marko Helenius authored at least 15 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Interactive Environment for Effective Cybersecurity Teaching and Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Security Dashboard Design for Non-Experts in Sigfox-based Smart Spaces.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

2019
Usability, security and trust in password managers: A quest for user-centric properties and features.
Comput. Sci. Rev., 2019

2016
Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance.
Proceedings of the 22nd International Conference on Virtual System & Multimedia, 2016

Learnings from the Finnish Game Industry.
Proceedings of the 10th Travelling Conference on Pattern Languages of Programs, 2016

2015
A non-repudiable negotiation protocol for security service level agreements.
Int. J. Commun. Syst., 2015

Phishing knowledge based user modelling in software design.
Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST'15), 2015

Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution.
Proceedings of the Formal Methods for Industrial Critical Systems, 2015

2014
Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate?
Behav. Inf. Technol., 2014

2013
Tailored Security: Building Nonrepudiable Security Service-Level Agreements.
IEEE Veh. Technol. Mag., 2013

Accountable security mechanism based on security service level agreement.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
A usability test of whitelist and blacklist-based anti-phishing application.
Proceedings of the International Conference on Media of the Future, 2012

2007
Usability evaluation of anti-phishing toolbars.
J. Comput. Virol., 2007

2006
About malicious software in smartphones.
J. Comput. Virol., 2006

Open Problems in Computer Virology.
J. Comput. Virol., 2006


  Loading...