POSTER: When and How to Implicitly Authenticate Smartphone Users

Aaron Atwater , Hassan Khan , Urs Hengartner
computer and communications security 1415 -1417

2
2014
Benchmarking pareto archiving heuristics in the presence of concept drift: diversity versus age

Aaron Atwater , Malcolm I. Heywood
genetic and evolutionary computation conference 885 -892

10
2013
Itus: an implicit authentication framework for android

Hassan Khan , Aaron Atwater , Urs Hengartner
acm/ieee international conference on mobile computing and networking 507 -518

99
2014
On the application of GP to streaming data classification tasks with label budgets

Ali Vahdat , Aaron Atwater , Andrew R. McIntyre , Malcolm I. Heywood
genetic and evolutionary computation conference 1287 -1294

8
2014
GP under streaming data constraints: a case for pareto archiving?

Aaron Atwater , Malcolm I. Heywood , Nur Zincir-Heywood
genetic and evolutionary computation conference 703 -710

13
2012
A comparative evaluation of implicit authentication schemes

Hassan Khan , Aaron Atwater , Urs Hengartner
Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings 17 255 -275

61
2014
Leading Johnny to Water: Designing for Usability and Trust.

Cecylia Bocovich , Urs Hengartner , Ed Lank , Ian Goldberg
symposium on usable privacy and security 69 -88

29
2015
Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices

Erinn Atwater , Urs Hengartner
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks 91 -102

17
2016
Netsim: Network simulation and hacking for high schoolers

Erinn Atwater , Cecylia Bocovich , Urs Hengartner , Ian Goldberg

8