Noura N. Alomar
Cited by
Cited by
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99, 519-535, 2017
Performance-based comparative assessment of open source web vulnerability scanners
M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman
Security and Communication Networks 2017, 2017
" You've got your nice list of bugs, now what?" vulnerability discovery and management processes in the wild
N Alomar, P Wijesekera, E Qiu, S Egelman
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 319-339, 2020
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
Human factors in the design and evaluation of bioinformatics tools
N Al-Ageel, A Al-Wabil, G Badr, N AlOmar
Procedia Manufacturing 3, 2003-2010, 2015
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
N Alomar, S Egelman
Proceedings on Privacy Enhancing Technologies, 2022
The design of a hybrid cultural model for Arabic gamified systems
N Alomar, V Wanick, G Wills
Computers in human behavior 64, 472-485, 2016
Behavioral consequences of Pokémon GO: the exaggerated picture
N Alomar, M Alsaleh, A Alarifi
Computers in Human Behavior 90, 223-245, 2019
A qualitative model of older adults’ contextual decision-making about information sharing
A Frik, J Bernd, N Alomar, S Egelman
Workshop on the Economics of Information Security (WEIS 2020), 2020
Color image ray transform technique for detecting phishing web pages
AM Alhumaisan, MA Alsaleh, NN Alomar
US Patent App. 15/333,647, 2018
Usability engineering of agile software project management tools
N Alomar, N Almobarak, S Alkoblan, S Alhozaimy, S Alharbi
Design, User Experience, and Usability: Design Thinking and Methods: 5th …, 2016
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts
N Alomar, M Alsaleh, A Alarifi
Computers & Security 85, 300-312, 2019
Method and system for dynamically generating a hint to recall a password for a user account of a user
AS Alarifi, MA Alsaleh, NN Alomar
US Patent 10,440,008, 2019
Lessons in vcr repair: Compliance of android app developers with the california consumer privacy act (ccpa)
N Samarin, S Kothari, Z Siyed, O Bjorkman, R Yuan, P Wijesekera, ...
arXiv preprint arXiv:2304.00944, 2023
Security and Privacy Failures in Popular {2FA} Apps
C Gilsenan, F Shakir, N Alomar, S Egelman
32nd USENIX Security Symposium (USENIX Security 23), 2079-2096, 2023
Method and system for managing a gamified trustee based social authentication to recover an account of a user
NN Alomar, MA Alsaleh
US Patent App. 15/259,047, 2018
Decentralized backup and recovery of TOTP secrets
C Gilsenan, N Alomar, A Huang, S Egelman
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-2, 2020
Someone in your contact list: Cued recall-based textual passwords
N Alomar, M Alsaleh, A Alarifi
IEEE Transactions on Information Forensics and Security 12 (11), 2574-2589, 2017
The system can't perform the operation now. Try again later.
Articles 1–20