A framework for detection and measurement of phishing attacks S Garera, N Provos, M Chew, AD Rubin Proceedings of the 2007 ACM workshop on Recurring malcode, 1-8, 2007 | 643 | 2007 |
Baffletext: A human interactive proof M Chew, HS Baird Electronic Imaging 2003, 305-316, 2003 | 270 | 2003 |
Image recognition captchas M Chew, JD Tygar Information Security, 268-279, 2004 | 263 | 2004 |
Mitigating buffer overflows by operating system randomization M Chew, D Song | 262 | 2002 |
Quantification of radiation-induced regional lung injury with perfusion imaging LB Marks, MT Munley, DP Spencer, GW Sherouse, GC Bentel, ... International Journal of Radiation Oncology* Biology* Physics 38 (2), 399-409, 1997 | 147 | 1997 |
Side effects are not sufficient to authenticate software U Shankar, M Chew, JD Tygar USENIX Security Symposium 8 (3), 2004 | 115 | 2004 |
Multiplicative differentials N Borisov, M Chew, R Johnson, D Wagner Fast Software Encryption, 17-33, 2002 | 55 | 2002 |
Tracking Protection in Firefox For Privacy and Performance G Kontaxis, M Chew | 43* | |
(Under)mining Privacy in Social Networks M Chew, D Balfanz, B Laurie Web 2.0 Security and Privacy, 2008 | 34 | 2008 |
Collaborative filtering captchas M Chew, JD Tygar Human Interactive Proofs, 66-81, 2005 | 30 | 2005 |
Contextual identity: Freedom to be all your selves M Chew, S Stamm Proceedings of the Workshop on Web 2, 2013 | 8 | 2013 |
Original-Authentication-Results Header Field M Kucherawy, M Chew | | 2012 |
158 Physical and biological predictors of radiation-induced whole lung injury: Early results of a prospective study LB Marks, M Munley, G Bentel, D Hollis, S Zhou, R Jirtle, FM Kong, ... International Journal of Radiation Oncology* Biology* Physics 36 (1), 237, 1996 | | 1996 |