Skip to main content
UAB - The University of Alabama at Birmingham
admin login frontend login
Center for Cyber Security
College of Arts and Sciences
  • College Quicklinks
    • Home
    • Undergraduate Program & Majors
    • Graduate Program & Majors
    • Student Resources
    • Advising
    • Scholarships
    • Faculty Resources
  • UAB Quicklinks
      • UAB Home
      • Academic Calendar
      • Accessibility
      • AdminSystems
      • Apply
      • AskIT
      • Blazer Express
      • BlazerNET
      • BlazerPulse
      • Bookstore
      • Campus Calendar
      • Campus Map
      • Canvas
      • Departments
      • Directory
      • Email
      • Emergency/B-Alert
      • Employee Resources
      • Employment
      • MyUAB Employee Portal
      • Giving to UAB
      • TechConnect
      • UAB eLearning
      More Items
 
  • Home
  • About
    • Contact Us
  • Core Areas & Research
  • Give
  • Core Areas
    • Information Assurance
    • Information Intelligence and Analytics
    • Physical and Digital Forensics
  • Research
    • Publications
    • Selected Papers
    • Dissertations
    • Books
More

Selected Papers

  • Chen Wei, Alan Sprague, and Gary Warner
    Clustering Malware-generated Spam Emails with a Novel Fuzzy String Matching Algorithm

  • Chun Wei, Alan Sprague, Gary warner, and Anthony Skjellum
    Mining Spam Email to Identify Common Origins for Forensic Application

  • Steve Sheng, Brad Wardman, Gary Warner, Lorrie Faith Cranor, Jason Hong, and Chengshan Zhang 
  • An Empirical Analysis of Phishing Blacklists

  • Brad Wardman and Gary Warner
    Automating Phishing Website Identification

  • Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gomez, Bradley Wardman, and Gary Warner
    Evaluating a Semisupervised Approach to Phishing URL Identification in a Realistic Scenario

  • Brad Wardman, Tommy Stallings, Gary warner, and Anthony Skjellum
    High-Performance Content-Based Phishing Attack Detection

  • Brad Wardman, Gaurang Shukla, and Gary Warner
    Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs

  • Philip J. Nero, Brad Wardman, Heith Copes, and Gary Warner
    Phishing: Crime that Pays

  • Chengcui Zhang, Wei-Bang Chen, Xin Chen, and Gary Warner
    Revealing Common Sources of Image Spam by Unsupervised Clustering with Visual Features

  • Mark B. Schmidt, Allen C. Johnston, Krik P. Arnet, Jim Q. Chen, and Suicheng Li
    A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness

  • Allen C. Johnston and Merrill Warkentin
    Fear Appeals and Information Security Behaviors: An Empirical Study

  • Allen C. Johnston, Mark B. Schmidt, Kirk P. Arnett, and Jeff Thomas
    Getting to the Root of the Problem

  • Jordan D. Shropshire, Merrill warkentin, and Allen C. Johnston
    Impact of Negative Message Framing on Security Adoption

  • Allen C. Johnston, and Ron Hale
    Improved Security through Information Security Governance

  • Allen C. Joohnston and Merrill Warkentin
    Information Privacy Compliance in the Healthcare Industry

  • Qingxiong Ma, Allen C. Johnston, and J. Michael Pearson
    Information Security Management Objectives and Practices — A Parsimonious Framework

  • Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, and HJ Hwang
    Rootkits and What We Know — Assessing US and Korean Knowledge and Perceptions

  • Merrill Warkentin, Allen C. Johnston, and Jordan Shropshire
    The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention

  • Rigib Hasan, Radu Sion, and Marianne Winslet
    Preventing History Forgery with Secure Provenance

  • Nitesh Saxena, Jan-Erik Ekberg, Kari Kostianinen, and N. Asokan
    Secure Device Pairing based on a Visual Channel

  • Tzipora Halevi and Nitesh Saxena
    On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels — The Case of Acoustic Eavesdropping

  • Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, and Yanbin Lu
    Password-protected Secret Sharing

  • Gretchen Parisi
    E-Prescribing: A Feasibility Study for Redmond Dental, Inc.

  • Matthew L. Curry, Anthony Skjellum, H. Lee Ward, and Ron Brightwell
    Gibraltar-A Reed-Solomon Coding Library for Storage

  • Julio C. Rivera
    Considering Information Security

  • Heith Copes and Lynne M. Vieraitis
    Bounded Rationality of Identity Thieves: Using Offender-based Research to Inform Policy

  • Heith Copes, Lynne Vieraitis, and Jennifer M. Jochum
    Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves

  • Tommie W. Singleton, Julio c. Rivera, William A. Hailey, and Edward M. Curry
    The Use of Encryption in IT Control and in the Security of Data and Information

  • Heith Copes, Kent R. Kerly, Rodney Huff, and John Kane
    Differentiating Identity Theft: An Exploratory Study of Victims Using a National Victimization Survey

  • Heith Copes and Lynne M. Vieraitis
    Understanding Identity Theft — Offenders’ Accounts of Their Lives and Crimes

  • Heith Copes, Lynne M. Vieraitis, Stephanie M. Cardwell and Arthur Vasquez
    Accounting for Identity Theft — The Roles of Lifestyle and Enactment

  • Allen C. Johnston, Barbara Wech, and Eric Jack
    Engaging Remote Employees — The Moderating Role of Remote Status in Determining Employee Information Security Policy Awareness

  • Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Savena, Chengcui Zhang, Ponnurangam, Kumaraguru, Paul C. van Oorschot, Wei-Bang ChenS
    Three-way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability

  • Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, and Dustin Rinehart
    Sensing-Enabled Channels for Hard-to-detect Command and Control of Mobile Devices

  • Tzipora Halevi and Nitesh Saxena
    Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing

  • Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, and Dinko Begusic
    Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

  • Di Ma, Nitesh Saxena, Tuo Xiang, and Yan Zhu
    Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing

  • Haoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, and Yan Zhu
    Tap-Wave-Rub-Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures
 
uab college of arts and sciences logo

Department of Computer Science

 
  • Contact UAB
  • |
  • |
  • A-Z Site Index
  • |
  • Privacy
  • |
  • Terms of Use
  • |
  • © 2023 The University of Alabama at Birmingham
UAB is an Equal Opportunity/Affirmative Action Employer committed to fostering a diverse, equitable and family-friendly environment in which all faculty and staff can excel and achieve work/life balance irrespective of race, national origin, age, genetic or family medical history, gender, faith, gender identity and expression as well as sexual orientation. UAB also encourages applications from individuals with disabilities and veterans.