Vijay H. Kothari

According to our database1, Vijay H. Kothari authored at least 14 papers between 2013 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Capturing the iccMAX calculatorElement: A Case Study on Format Design.
Proceedings of the 43rd IEEE Security and Privacy, 2022

2020
Bridging the Gap Between Intent and Outcome: Knowledge, Tools & Principles for Security-Minded Decision-Making.
PhD thesis, 2020

Eyes on URLs: Relating Visual Behavior to Safety Decisions.
Proceedings of the ETRA '20: 2020 Symposium on Eye Tracking Research and Applications, 2020

2019
Human-Computability Boundaries.
Proceedings of the Security Protocols XXVII, 2019

Mismorphism: The Heart of the Weird Machine.
Proceedings of the Security Protocols XXVII, 2019

2018
Going Dark: A Retrospective on the North American Blackout of 2038.
Proceedings of the New Security Paradigms Workshop, 2018

2017
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users.
Proceedings of the Workshop on Security Fatigue, 2016

Validating an Agent-Based Model of Human Password Behavior.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

2015
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?
Proceedings of the Driving Quality in Informatics: Fulfilling the Promise, 2015

Mismorphism: a semiotic model of computer security circumvention (poster abstract).
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Measuring the security impacts of password policies using cognitive behavioral agent-based modeling.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Mismorphism: a Semiotic Model of Computer Security Circumvention.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2013
Combinatorial algorithms for minimizing the weighted sum of completion times on a single machine.
Oper. Res. Lett., 2013


  Loading...