Zinaida Benenson

Orcid: 0009-0006-7158-0219

Affiliations:
  • University of Erlangen-Nuremberg, Germany


According to our database1, Zinaida Benenson authored at least 61 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities.
CoRR, 2023

Interplay of Security, Privacy and Usability in Videoconferencing.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

"You're not smart enough for it. You can't do it anyway." - Experiences and Coping Strategies of Female System Administrators.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations.
Digit. Investig., 2022

Usability of Antivirus Tools in a Threat Detection Scenario.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2020
Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective.
Proc. Priv. Enhancing Technol., 2020

Balancing resistance and resilience.
Netw. Secur., 2020

Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Privacy implications of room climate data.
J. Comput. Secur., 2019

Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit.
Inform. Spektrum, 2019

Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302).
Dagstuhl Reports, 2019

Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View.
Proceedings of the 2nd International Conference on Machine Learning and Machine Intelligence, 2019

Security Managers Are Not The Enemy Either.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Exploring Security Economics in IoT Standardization Efforts.
CoRR, 2018

Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

An Inquiry into Perception and Usage of Smartphone Permission Models.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Malicious IoT Implants: Tampering with Serial Communication over the Internet.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Exploring Security Processes in Organizations: the Case of Smartphones.
Proceedings of the Mensch und Computer 2017, 2017

Unpacking Spear Phishing Susceptibility.
Proceedings of the Financial Cryptography and Data Security, 2017

Privacy Implications of Room Climate Data.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems.
CoRR, 2016

On the security of the ZigBee Light Link touchlink commissioning procedure.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Differences between Android and iPhone Users in Their Security and Privacy Awareness.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Susceptibility to URL-based Internet attacks: Facebook vs. email.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

User Acceptance of Privacy-ABCs: An Exploratory Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Specifying IT Security Awareness.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Android and iOS users' differences concerning security and privacy.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Security feeling of mobile phone users.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012

2011

2010
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze).
it Inf. Technol., 2010

Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption.
Ad Hoc Sens. Wirel. Networks, 2010

2009
Cooperative Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009

2008
Access control in wireless sensor networks.
PhD thesis, 2008

Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
Advanced Evasive Data Storage in Sensor Networks.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

Lower Bounds.
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007

Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Tampering with Motes: Real-World Attacks on Wireless Sensor Networks.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Authenticated Query Flooding in Sensor Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Authenticated Query Flooding in Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Implementing Agreement Protocols in Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
Proceedings of the Computer Security, 2006

Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

Safety, Liveness, and Information Flow: Dependability Revisited.
Proceedings of the ARCS 2006, 2006

2005
Secure Multi-Party Computation with Security Modules.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Simple Evasive Data Storage in Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

An algorithmic framework for robust access control in wireless sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

Cryptographic Attack Metrics.
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005

2004
User Authentication in Sensor Networks.
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004


  Loading...