Mike Just

Orcid: 0000-0002-9669-5067

According to our database1, Mike Just authored at least 62 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection.
CoRR, 2024

2023
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset.
CoRR, 2023

A comic-based approach to permission request communication.
Comput. Secur., 2023

2022
IoTDevID: A Behavior-Based Device Identification Method for the IoT.
IEEE Internet Things J., 2022

Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills.
Behav. Inf. Technol., 2022

SI22: A dataset for analysis of DoS attack on the Cloud.
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022

The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
IoTDevID: A Behaviour-Based Fingerprinting Method for Device Identification in the IoT.
CoRR, 2021

A review of amplification-based distributed denial of service attacks and their mitigation.
Comput. Secur., 2021

Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
An Investigation of Comic-Based Permission Requests.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management.
Proceedings of the NordiCHI '20: Shaping Experiences, 2020

Tracking Mixed Bitcoins.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis.
CoRR, 2019

Personal Safety App Effectiveness.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems.
Comput., 2018

Experimental large-scale review of attractors for detection of potentially unwanted applications.
Comput. Secur., 2018

2017
Stop annoying me!: an empirical investigation of the usability of app privacy notifications.
Proceedings of the 29th Australian Conference on Computer-Human Interaction, 2017

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism.
Proceedings of the Human-Computer Interaction - INTERACT 2017, 2017

Everything's Cool: Extending Security Warnings with Thermal Feedback.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems.
J. Circuits Syst. Comput., 2016

Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation.
Adv. Softw. Eng., 2016

Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms.
Proceedings of the Information Security Theory and Practice, 2016

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

Investigating Time Series Visualisations to Improve the User Experience.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Investigating the work practices of network security professionals.
Inf. Comput. Secur., 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015.
CoRR, 2015

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking.
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

2014
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.
CoRR, 2014

Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors.
CoRR, 2014

An ID and Address Protection Unit for NoC based Communication Architectures.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks.
Proceedings of the Financial Cryptography and Data Security, 2013

Designing interactive secure system: chi 2013 special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
On the security and usability of dual credential authentication in UK online banking.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming.
Proceedings of the Entertainment Computing - ICEC 2012 - 11th International Conference, 2012

2011
Schnorr Identification Protocol.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

PKI Trust Models.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nonrepudiation of Digital Signatures.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Needham-Schroeder Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Key Escrow.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Key Agreement.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Identity Management.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Diffie-Hellman Key Agreement.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Challenge-Response Identification.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
What's in a Name?
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Pictures or questions?: examining user responses to association-based authentication.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010

2009
Personal choice and challenge questions: a security and usability assessment.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

2005
Schnorr Indentification Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Needham-Schroeder Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Key agreement.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Diffie-Hellman Key Agreement.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Challenge-Response Identification.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
Securely Available Credentials (SACRED) - Credential Server Framework.
RFC, April, 2004

Designing and Evaluating Challenge-Question Systems.
IEEE Secur. Priv., 2004

2003
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, Second International Conference, 2003

1999
Addressing the Problem of Undetected Signature Key Compromise.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
Some Timestamping Protocol Failures.
Proceedings of the Network and Distributed System Security Symposium, 1998

1996
Authenticated Multi-Party Key Agreement.
Proceedings of the Advances in Cryptology, 1996

1994
On Key Distribution via True Broadcasting.
Proceedings of the CCS '94, 1994


  Loading...