Was This You? Investigating the Design Considerations for Suspicious Login Notifications
Sahin, S., Sahin, B., and Li, F. Was This You? Investigating the Design Considerations for Suspicious Login Notifications. In *Proceedings of NDSS 2025*.
Sahin, S., Sahin, B., and Li, F. Was This You? Investigating the Design Considerations for Suspicious Login Notifications. In *Proceedings of NDSS 2025*.
Sahin, S., Sahin, B., Berthier, R., Davis, K., Zonouz, S., and Li, F. The Challenges and Opportunities with Cybersecurity Regulations: A Case Study of the US Electric Power Sector. In *Proceedings of ACM CCS 2025*.
Hu, Y., Al Roomi, S., Sahin, S., and Li, F. Unmasking the Security and Usability of Password Masking. In *Proceedings of ACM CCS 2024*.
Sahin, S., Al Roomi, S., Poteat, T., and Li, F. Investigating the Password Policy Practices of Website Administrators. In *Proceedings of IEEE S&P 2023*.
Sahin, S., and Li, F. Don’t Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. In *Proceedings of ACM CCS 2021*.
Conference Talk at Network and Distributed System Security Symposium (NDSS), San Diego, CA
Invited Lecture at Georgia Institute of Technology — CS 4267 Critical Infrastructure Security and Resilience, Atlanta, GA
Conference Talk at ACM Conference on Computer and Communications Security (CCS), Taipei, Taiwan-(remote)
Conference Talk at IEEE Symposium on Security and Privacy (IEEE S&P), San Francisco, CA
Invited Talk at Georgia Institute of Technology Cyber Lecture Series, Atlanta, GA
Conference Talk at ACM Conference on Computer and Communications Security (CCS), Seoul, KR (remote)