Ehsan Toreini
Título
Citado por
Citado por
Ano
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Data Privacy Management and Autonomous Spontaneous Security, 380-389, 2013
582013
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
International Journal of Information Security 17 (3), 291-313, 2018
522018
Touchsignatures: identification of user touch actions and PINs based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
422016
The relationship between trust in AI and trustworthy machine learning technologies
E Toreini, M Aitken, K Coopamootoo, K Elliott, CG Zelaya, A van Moorsel
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
262020
Texture to the rescue: Practical paper fingerprinting based on texture patterns
E Toreini, SF Shahandashti, F Hao
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-29, 2017
162017
SEIMCHA: A New Semantic Image CAPTCHA Using Geometric Transformations.
M Mehrnejad, AG Bafghi, A Harati, E Toreini
ISeCure 4 (1), 2012
112012
Multiple seimcha: multiple semantic image captcha
M Mehrnejad, AG Bafghi, A Harati, E Toreini
2011 International Conference for Internet Technology and Secured …, 2011
10*2011
Touchsignatures: Identification of user touch actions based on mobile sensors via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
A novel fuzzy metric to evaluate clusters for prolonging lifetime in wireless sensor networks
P Neamatollahi, H Taheri, E Toreini, M Naghibzadeh, MH Yaghmaee
2011 International Symposium on Artificial Intelligence and Signal …, 2011
92011
Clustering data with Particle Swarm Optimization using a new fitness
E Toreini, M Mehrnejad
2011 3rd Conference on Data Mining and Optimization (DMO), 266-270, 2011
82011
An acoustic side channel attack on enigma
E Toreini, B Randell, F Hao
School of Computing Science Technical Report Series, 2015
72015
A novel method in fuzzy data clustering based on chaotic PSO
E Toreini, M Mehrnejad
2011 International Conference for Internet Technology and Secured …, 2011
72011
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices
M Aitken, E Toreini, P Carmichael, K Coopamootoo, K Elliott, ...
Big Data & Society 7 (1), 2053951720908892, 2020
62020
Security analyzing and designing GUI with the resources model
M Mehrnejad, E Toreini, AG Bafghi
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
62011
What is this sensor and does this app need access to it?
M Mehrnezhad, E Toreini
Informatics 6 (1), 7, 2019
52019
PiSHi: click the images and I tell if you are a human
M Mehrnezhad, AG Bafghi, A Harati, E Toreini
International Journal of Information Security 16 (2), 133-149, 2017
52017
DOMtegrity: ensuring web page integrity against malicious browser extensions
E Toreini, SF Shahandashti, M Mehrnezhad, F Hao
International journal of information security 18 (6), 801-814, 2019
42019
Removing trusted tallying authorities
P McCorry, E Toreini, M Mehrnezhad
School of Computing Science Technical Report Series, 2016
42016
Analysis of The Usage of Chaotic Theory in Data Clustering Using Particle Swarm Optimization
SP NAVI, E Toreini, M Mehrnejad, S KAZEM
Indian J. Sci 4 (3), 335-353, 2014
42014
A new image based CAPTCHA based on geometric transformations
M Mehrnejad, A Ghaemi, A Harati, E Toreini
8thInternational ISC Conference on Information Security and Cryptology, FUM …, 2011
42011
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20