Author of the publication

Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.

, , , , , , and . SP, page 2068-2085. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study., , , , and . SOUPS @ USENIX Security Symposium, page 597-616. USENIX Association, (2021)A Qualitative Evaluation of Reverse Engineering Tool Usability., , , and . ACSAC, page 619-631. ACM, (2022)An Investigation of US Universities' Implementation of FERPA Student Directory Policies and Student Privacy Preferences., , , and . CHI, page 791:1-791:35. ACM, (2024)The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level., , , , , and . USENIX Security Symposium, page 621-637. USENIX Association, (2018)How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks., , , , , , and . CHI, page 589:1-589:18. ACM, (2022)Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery., , , , , , and . SP, page 1997-2014. IEEE, (2023)User Interactions and Permission Use on Android., , , , , and . CHI, page 362-373. ACM, (2017)Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition., , , , , and . CCS, page 1141-1155. ACM, (2022)Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility., , , and . CHI, page 525. ACM, (2019)Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples., , , , and . USENIX Security Symposium, page 4041-4058. USENIX Association, (2022)