Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.

Urs Hengartner , Daniel Vogel , Hassan Khan
symposium on usable privacy and security 225 -239

29
2015
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones

Urs Hengartner , Hassan Khan , Lalit Agarwal
symposium on usable privacy and security 221 -236

7
2016
Chaperone: Real-time Locking and Loss Prevention for Smartphones

Urs Hengartner , Mohammad Mannan , Hassan Khan , Jiayi Chen
usenix security symposium 325 -342

2020
What is the impact of p2p traffic on anomaly detection

Irfan Ul Haq , Sardar Ali , Hassan Khan , Syed Ali Khayam
recent advances in intrusion detection 1 -17

15
2010
Designing a cluster-based covert channel to evade disk investigation and forensics

Hassan Khan , Mobin Javed , Syed Ali Khayam , Fauzan Mirza
Computers & Security 30 ( 1) 35 -49

23
2011
POSTER: When and How to Implicitly Authenticate Smartphone Users

Aaron Atwater , Hassan Khan , Urs Hengartner
computer and communications security 1415 -1417

2
2014
Progressive Differential Thresholding for Network Anomaly Detection

Sardar Ali , Hassan Khan , Muhammad Ahmad , Syed Ali Khayam
2011 IEEE International Conference on Communications (ICC) 1 -5

2011
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane

Rajesh Narayanan , Saikrishna Kotha , Geng Lin , Aimal Khan
2012 European Workshop on Software Defined Networking 79 -84

37
2012
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

Hassan Khan , Jason Ceci , Jonah Stegman , Adam J. Aviv
annual computer security applications conference 249 -262

2020
Evaluating authentication options for mobile health applications in younger and older adults.

Kelly Grindrod , Hassan Khan , Urs Hengartner , Stephanie Ong
PLOS ONE 13 ( 1)

8
2018
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning

Muhammad Qasim Ali , Ehab Al-Shaer , Hassan Khan , Syed Ali Khayam
ACM Transactions on Information and System Security 15 ( 4) 1 -30

23
2013
Towards application-centric implicit authentication on smartphones

Hassan Khan , Urs Hengartner
workshop on mobile computing systems and applications 10

47
2014
Traffic Anomaly Detection in the presence of P2P traffic

Sardar Ali , Kui Wu , Hassan Khan
local computer networks 482 -485

2014
Embedding a Covert Channel in Active Network Connections

Hassan Khan , Yousra Javed , Fauzan Mirza , Syed Ali Khayam
global communications conference 4933 -4938

6
2009
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication

Hassan Khan , Urs Hengartner , Daniel Vogel
international conference on mobile systems, applications, and services 41 -53

8
2018
On achieving good operating points on an ROC plane using stochastic anomaly score prediction

Muhammad Qasim Ali , Hassan Khan , Ali Sajjad , Syed Ali Khayam
computer and communications security 314 -323

12
2009
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes

Hassan Khan , Urs Hengartner , Daniel Vogel
international conference on mobile systems, applications, and services 387 -398

31
2016
Determining malicious executable distinguishing attributes and low-complexity detection

Hassan Khan , Fauzan Mirza , Syed Ali Khayam
Journal of Computer Virology and Hacking Techniques 7 ( 2) 95 -105

15
2011
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing

Hassan Khan , Urs Hengartner , Daniel Vogel
human factors in computing systems 164

15
2018