Steve Sheng

According to our database1, Steve Sheng authored at least 11 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Captive-Portal Identification Using DHCP or Router Advertisements (RAs).
RFC, December, 2015

Inventory and Analysis of WHOIS Registration Objects.
RFC, March, 2015

2011
A RESTful Web Service for Internet Name and Address Directory Services.
login Usenix Mag., 2011

2010
Teaching Johnny not to fall for phish.
ACM Trans. Internet Techn., 2010

Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Are your participants gaming the system?: screening mechanical turk workers.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Improving phishing countermeasures: An analysis of expert interviews.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
P3P deployment on websites.
Electron. Commer. Res. Appl., 2008

Lessons from a real world evaluation of anti-phishing training.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007


  Loading...