Where to Look for What You See Is What You Sign? User Confusion in Transaction Security
Vincent Haupert and Stephan Gabert
On the Security and Applicability of Fragile Camera Fingerprints
Erwin Quiring, Matthias Kirchner and Konrad Rieck
Attacking speaker recognition systems with phoneme morphing
Henry Turner, Giulio Lovisotto and Ivan Martinovic
Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks
Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo and Chunhua Su
A Framework for Evaluating Security in the Presence of Signal Injection Attacks
Ilias Giechaskiel, Youqian Zhang and Kasper Rasmussen