Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements TD Breaux, H Hibshi, A Rao Requirements Engineering 19 (3), 281-307, 2014 | 73 | 2014 |
Effect of grammar on security of long passwords A Rao, B Jha, G Kini Proceedings of the third ACM conference on Data and application security and …, 2013 | 67 | 2013 |
Expecting the unexpected: Understanding mismatched privacy expectations online A Rao, F Schaub, N Sadeh, A Acquisti, R Kang Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 77-96, 2016 | 57 | 2016 |
What do they know about me? Contents and Concerns of Online Behavioral Profiles A Rao, F Schaub, N Sadeh PASSAT 2014: International Conference on Information Privacy, Security, Risk …, 2015 | 57* | 2015 |
Formal analysis of privacy requirements specifications for multi-tier applications TD Breaux, A Rao 2013 21st IEEE International Requirements Engineering Conference (RE), 14-23, 2013 | 38 | 2013 |
Privacy and behavioral advertising: Towards meeting users’ preferences PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh Symposium on usable privacy and security (SOUPS), 22-24, 2015 | 18 | 2015 |
Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach I Ruchkin, A Rao, D De Niz, S Chaki, D Garlan Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015 | 16 | 2015 |
Why people are (un) willing to share information with online advertisers PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh Technical report CMU-ISR-15-106, 2015 | 13 | 2015 |
Smartphone fingerprint authentication versus pins: A usability study (cmu-cylab-14-012) S Karthikeyan, S Feng, A Rao, N Sadeh | 12* | 2014 |
Towards usable privacy policies: Semi-automatically extracting data practices from websites’ privacy policies N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, J Reidenberg, ... Poster Proceedings, SOUPS, 9-11, 2014 | 11 | 2014 |
Less is more? investigating the role of examples in security studies using analogical transfer A Rao, H Hibshi, T Breaux, JM Lehker, J Niu Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014 | 4 | 2014 |
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns TD Breaux, H Hibshi, A Rao, JM Lehker 2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012 | 3 | 2012 |
Assessing the impact of data practices on user privacy A Rao Technische Universität München, 2018 | 2 | 2018 |
Managing Risk in Mobile Applications With Formal Security Policies T Breaux, A Rao CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2013 | 2 | 2013 |
Types of Privacy Expectations A Rao, J Pfeffer Frontiers in Big Data 3, 7, 2020 | | 2020 |
Data Siphoning Across Borders: The Role of Internet Tracking A Rao, J Pfeffer 2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019 | | 2019 |
Security Implications of Induced Earthquakes A Rao, B Jha 2016 AGU Fall Meeting, 2016 | | 2016 |
Security Implications of Induced Earthquakes B Jha, A Rao AGU Fall Meeting Abstracts 2016, S31B-2768, 2016 | | 2016 |
Understanding Users’ Online Privacy Expectations A Rao Carnegie Mellon University, 2016 | | 2016 |
mκηΕΙΙΗαεΦλ= T Breaux, A Rao | | 2013 |