Who, when, where: Obfuscation preferences in location-sharing applications (CMU-CyLab-11-013)

Jayant Venkatanathan , Vassilis Kostakos , Evangelos Karapanos , Michael Benisch
figshare

2011
Method and system for controlling context-aware cybersecurity training

Norman Sadeh-Koniecpol , Kurt Wescoe , Jason Brubaker , Jason Hong

326
2016
Mock attack cybersecurity training system and methods

Norman Sadeh-Koniecpol , Kurt Wescoe , Jason Brubaker , Jason Hong

262
2017
Context-aware training systems, apparatuses, and methods

Norman Sadeh-Koniecpol , Kurt Wescoe , Jason Brubaker , Jason Hong

237
2017
Context-aware training systems, apparatuses, and methods

Norman Sadeh-Koniecpol , Kurt Wescoe , Jason Brubaker , Jason Hong

158
2016
Assessing security risks of users in a computing network

Trevor T Hawthorn , Norman Sadeh-Koniecpol , Nathan Miller , Jeff LoSAPIO

148
2020
Context-aware cybersecurity training systems, apparatuses, and methods

Norman Sadeh-Koniecpol , Kurt Wescoe , Jason Brubaker , Jason Hong

120
2018
Discovering neighborhood clusters and uses therefor

Justin Cranshaw , Raz Schwartz , Jason I Hong , Norman Sadeh-Koniecpol

7
2017
User-controllable learning of policies

Norman Sadeh-Koniecpol , Paul Hankes Drielsma , Lorrie Faith Candor , Patrick Kelley

171
2013
When Are Users Comfortable Sharing Locations with Advertisers?(CMU-CyLab-10-017)

Patrick Gage Kelley , Michael Benisch , Lorrie Cranor , Norman Sadeh-Koniecpol
Carnegie Mellon University

Cybersecurity training system with automated application of branded content

Norman Sadeh-Koniecpol , Kurt Wescoe , Joseph A Ferrara

153
2016
Advanced processing of electronic messages with attachments in a cybersecurity system

Kurt Wescoe , John T Campbell , Joseph A Ferrara , Trevor T Hawthorn

137
2018
Determining authenticity of reported user action in cybersecurity risk assessment

Kurt Wescoe , Trevor T Hawthorn , Alan Himler , Patrick H Veverka

123
2019
50
2017
Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system

Alan Himler , John T Campbell , Joseph A Ferrara , Trevor T Hawthorn

42
2017
Determining authenticity of reported user action in cybersecurity risk assessment

Kurt Wescoe , Trevor Tyler Hawthorn , Alan Himler , Patrick H Veverka

2020
Semantic Web technologies for context-aware museum tour guide applications

Shih-Chun Chou , Wen-Tai Hsieh , F.L. Gandon , N.M. Sadeh
advanced information networking and applications 2 709 -714

61
2005
ALDRICH, Jonathan CMU-ISR-11-114 ALTMAN, Neal CMU-ISR-11-122

Michael BENISCH , Michael BIGRIGG , Travis BREAUX , Kathleen M CARLEY