Now showing items 1-2 of 2
Building trust in the user I/O in computer systems
(Georgia Institute of Technology, 2017-07-26)
User input plays an essential role in computer security because it can control system behavior and make security decisions in the system. System output to users, or user output, is also important because it often contains ...
Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure
(Georgia Institute of Technology, 2017-11-13)
Recently we have witnessed rapid consolidation of traditional and emerging communications infrastructures, leading to the convergence of telephony and the Internet. While this convergence has been beneficial in many ways, ...