共 82 条
[71]
Tian Y, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P361
[72]
Users Really Do Plug in USB Drives They Find
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:306-319
[73]
SURROUNDWEB: Mitigating Privacy Concerns in a 3D Web Browser
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:431-446
[74]
Vom BrockeJ., 2009, ECIS, P2206
[75]
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:374-391
[76]
Webster J, 2002, MIS QUART, V26, pXIII
[77]
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:1077-1093
[78]
Wijesekera P, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P499
[79]
Winter P, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P411
[80]
Yuan XJ, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P49