Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,257,921 papers from all fields of science
Search
Sign In
Create Free Account
Privacy software
Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Anonymous web browsing
Computer security
Device fingerprint
Encryption
Expand
Broader (1)
Privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking
Yi Han
,
David Hubczenko
,
+6 authors
S. Erfani
arXiv.org
2019
Corpus ID: 67856154
Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to…
Expand
2019
2019
What is a Secure Programming Language?
C. Cifuentes
,
G. Bierman
Summit on Advances in Programming Languages
2019
Corpus ID: 195877966
Our most sensitive and important software systems are written in programming languages that are inherently insecure, making the…
Expand
Review
2018
Review
2018
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact)
Stefan Krüger
,
Johannes Späth
,
Karim Ali
,
E. Bodden
,
M. Mezini
Dagstuhl Artifacts Ser.
2018
Corpus ID: 261285433
In this artefact, we present CrySL, an extensible approach to validating the correct usage of cryptographic APIs. The artefact…
Expand
2017
2017
E-mail Header Injection Vulnerabilities
S. Chandramouli
,
Ziming Zhao
,
Adam Doupé
,
Gail-Joon Ahn
it - Information Technology
2017
Corpus ID: 9657943
Abstract E-mail Header Injection vulnerability is a class of vulnerability that can occur in web applications that use user input…
Expand
2016
2016
How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views
Charles Weir
,
A. Rashid
,
J. Noble
WSIW@SOUPS
2016
Corpus ID: 19025404
Programmers’ lack of knowledge and ability in secure development threatens everyone who uses mobile apps. There’s no consensus on…
Expand
2016
2016
Bridging the Void between Software Engineers and Security Experts
Tayyaba Nafees
,
Natalie J. Coull
,
Ian Ferguson
,
Adam T. Sampson
2016
Corpus ID: 85512955
The U.S. Department of Homeland Security (DHS) states that 90 percent of security incidents result from exploits against defects…
Expand
2012
2012
An Analysis of HIPAA Breach Data
P. Morrison
,
L. Williams
HealthSec
2012
Corpus ID: 40733585
As software developers, we have a responsibility to protect our user's data. When this data is protected health information (PHI…
Expand
2010
2010
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory
L. Cranor
Financial Cryptography
2010
Corpus ID: 7925697
How can we make security and privacy software more usable? The first step is to study our users. Ideally, we would watch them…
Expand
2007
2007
Privacy in e-Commerce Software
Michael Smit
2007
Corpus ID: 189315591
Revision with unchanged content. Privacy has become a significant issue in 21st century society. Businesses, technologists…
Expand
2003
2003
Designing a Privacy Preference Specification Interface : A Case Study
L. Cranor
2003
Corpus ID: 16057877
User interface designers frequently face the challenge of making software configuration options accessible to users. In this…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE