Folgen
Razieh Nokhbeh Zaeem
Razieh Nokhbeh Zaeem
Senior Software Engineer, Google
Bestätigte E-Mail-Adresse bei utexas.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The effect of the GDPR on privacy policies: Recent progress and future promise
RN Zaeem, KS Barber
ACM Transactions on Management Information Systems (TMIS) 12 (1), 1-20, 2020
2092020
Automated generation of oracles for testing user-interaction features of mobile apps
RN Zaeem, MR Prasad, S Khurshid
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
1292014
Privacycheck: Automatic summarization of privacy policies using data mining
RN Zaeem, RL German, KS Barber
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-18, 2018
1162018
Modeling and analysis of identity threat behaviors through text mining of identity theft stories
RN Zaeem, M Manoharan, Y Yang, KS Barber
Computers & Security 65, 50-63, 2017
1012017
Automated test generation and mutation testing for Alloy
A Sullivan, K Wang, RN Zaeem, S Khurshid
2017 IEEE International Conference on Software Testing, Verification and …, 2017
572017
Improving the effectiveness of spectra-based fault localization using specifications
D Gopinath, RN Zaeem, S Khurshid
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
552012
On sentiment of online fake news
RN Zaeem, C Li, KS Barber
2020 IEEE/ACM International Conference on Advances in Social Networks …, 2020
442020
Contract-based data structure repair using Alloy
R Nokhbeh Zaeem, S Khurshid
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
442010
An assessment of blockchain identity solutions: Minimizing risk and liability of authentication
R Rana, RN Zaeem, KS Barber
IEEE/WIC/ACM International Conference on Web Intelligence, 26-33, 2019
432019
Identity threat assessment and prediction
J Zaiss, R Nokhbeh Zaeem, KS Barber
Journal of Consumer Affairs 53 (1), 58-70, 2019
402019
PrivacyCheck v2: A tool that recaps privacy policies for you
R Nokhbeh Zaeem, S Anya, A Issa, J Nimergood, I Rogers, V Shah, ...
Proceedings of the 29th ACM international conference on information …, 2020
382020
A study of web privacy policies across industries
R Nokhbeh Zaeem, KS Barber
Journal of Information Privacy and Security 13 (4), 169-185, 2017
362017
A large publicly available corpus of website privacy policies based on dmoz
R Nokhbeh Zaeem, KS Barber
Proceedings of the eleventh ACM conference on data and application security …, 2021
312021
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes
RN Zaeem, S Budalakoti, KS Barber, M Rasheed, C Bajaj
2016 IEEE International Carnahan Conference on Security Technology (ICCST), 1-8, 2016
312016
It is an equal failing to trust everybody and to trust nobody: Stock price prediction using trust filters and enhanced user sentiment on Twitter
TC Huang, RN Zaeem, KS Barber
ACM Transactions on Internet Technology (TOIT) 19 (4), 1-20, 2019
262019
Towards a test automation framework for Alloy
A Sullivan, RN Zaeem, S Khurshid, D Marinov
Proceedings of the 2014 International SPIN Symposium on Model Checking of …, 2014
252014
Blockchain-based self-sovereign identity: Survey, requirements, use-cases, and comparative study
R Nokhbeh Zaeem, KC Chang, TC Huang, D Liau, W Song, A Tyagi, ...
IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent …, 2021
242021
Privacycheck v3: empowering users with higher-level understanding of privacy policies
R Nokhbeh Zaeem, A Ahbab, J Bestor, HH Djadi, S Kharel, V Lai, N Wang, ...
Proceedings of the Fifteenth ACM International Conference on Web Search and …, 2022
20*2022
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
R Nokhbeh Zaeem, M Manoharan, KS Barber
2016 European Intelligence and Security Informatics Conference (EISIC), 32-38, 2016
202016
History-aware data structure repair using SAT
R Nokhbeh Zaeem, D Gopinath, S Khurshid, KS McKinley
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
202012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20