Folgen
Razieh Nokhbeh Zaeem
Razieh Nokhbeh Zaeem
Senior Software Engineer, Google
Bestätigte E-Mail-Adresse bei utexas.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The effect of the GDPR on privacy policies: Recent progress and future promise
RN Zaeem, KS Barber
ACM Transactions on Management Information Systems (TMIS) 12 (1), 1-20, 2020
1562020
Automated generation of oracles for testing user-interaction features of mobile apps
RN Zaeem, MR Prasad, S Khurshid
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
1192014
Privacycheck: Automatic summarization of privacy policies using data mining
RN Zaeem, RL German, KS Barber
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-18, 2018
1032018
Modeling and analysis of identity threat behaviors through text mining of identity theft stories
RN Zaeem, M Manoharan, Y Yang, KS Barber
Computers & Security 65, 50-63, 2017
942017
Improving the effectiveness of spectra-based fault localization using specifications
D Gopinath, RN Zaeem, S Khurshid
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
552012
Automated test generation and mutation testing for Alloy
A Sullivan, K Wang, RN Zaeem, S Khurshid
2017 IEEE International Conference on Software Testing, Verification and …, 2017
532017
Contract-based data structure repair using Alloy
R Nokhbeh Zaeem, S Khurshid
ECOOP 2010–Object-Oriented Programming: 24th European Conference, Maribor …, 2010
422010
An assessment of blockchain identity solutions: Minimizing risk and liability of authentication
R Rana, RN Zaeem, KS Barber
IEEE/WIC/ACM International Conference on Web Intelligence, 26-33, 2019
382019
Identity threat assessment and prediction
J Zaiss, R Nokhbeh Zaeem, KS Barber
Journal of Consumer Affairs 53 (1), 58-70, 2019
382019
On sentiment of online fake news
RN Zaeem, C Li, KS Barber
2020 IEEE/ACM International Conference on Advances in Social Networks …, 2020
352020
PrivacyCheck v2: A tool that recaps privacy policies for you
R Nokhbeh Zaeem, S Anya, A Issa, J Nimergood, I Rogers, V Shah, ...
Proceedings of the 29th ACM international conference on information …, 2020
322020
A study of web privacy policies across industries
R Nokhbeh Zaeem, KS Barber
Journal of Information Privacy and Security 13 (4), 169-185, 2017
322017
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes
RN Zaeem, S Budalakoti, KS Barber, M Rasheed, C Bajaj
2016 IEEE International Carnahan Conference on Security Technology (ICCST), 1-8, 2016
302016
A large publicly available corpus of website privacy policies based on dmoz
R Nokhbeh Zaeem, KS Barber
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
262021
It is an equal failing to trust everybody and to trust nobody: Stock price prediction using trust filters and enhanced user sentiment on Twitter
TC Huang, RN Zaeem, KS Barber
ACM Transactions on Internet Technology (TOIT) 19 (4), 1-20, 2019
262019
Towards a test automation framework for Alloy
A Sullivan, RN Zaeem, S Khurshid, D Marinov
Proceedings of the 2014 International SPIN Symposium on Model Checking of …, 2014
232014
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups
R Nokhbeh Zaeem, M Manoharan, KS Barber
2016 European Intelligence and Security Informatics Conference (EISIC), 32-38, 2016
202016
History-aware data structure repair using SAT
R Nokhbeh Zaeem, D Gopinath, S Khurshid, KS McKinley
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
202012
Blockchain-based self-sovereign identity: Survey, requirements, use-cases, and comparative study
R Nokhbeh Zaeem, KC Chang, TC Huang, D Liau, W Song, A Tyagi, ...
IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent …, 2021
172021
Enhancing and evaluating identity privacy and authentication strength by utilizing the identity ecosystem
KC Chang, RN Zaeem, KS Barber
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 114-120, 2018
172018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20