![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Abdou, A.R., Barrera, D., & Oorschot, P. C. (2015, December). What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks [Paper]. International Conference on Passwords (PASSWORDS 2015), Cambridge, UK. External link
Alsaleh, M., Barrera, D., & Oorschot, P. C. (2008, December). Improving Security Visualization with Exposure Map Filtering [Paper]. Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA. External link
Barrera, D., McCarney, D., Clark, J., & Oorschot, P. C. (2014, July). Baton: certificate agility for android's decentralized signing infrastructure [Paper]. ACM Conference on Security and Privacy in Wireless & Mobile Networks (WiSec 2014), Oxford, United Kingdom (12 pages). External link
Barrera, D., Enck, W., & Oorschot, P. C. (2012, May). Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems [Paper]. Mobile Security Technologies Workshop (IEEE MoST 2012), San Francisco, Calif. (10 pages). External link
Barrera, D., Clark, J., McCarney, D., & Oorschot, P. C. (2012, October). Understanding and improving app installation security mechanisms through empirical analysis of android [Paper]. 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Raleigh, North Carolina. External link
Barrera, D., Wurster, G., & Oorschot, P. C. (2011). Back to the Future: Revisiting IPv6 Privacy Extensions. ;Login:, 36(1), 16-26. External link
Barrera, D., & Oorschot, P. C. (2011). Secure Software Installation on Smartphones. IEEE Security & Privacy Magazine, 9(3), 42-48. External link
Barrera, D., & Oorschot, P. C. (2010). Accommodating IPv6 Addresses in Security Visualization Tools. Information Visualization, 10(2), 107-116. External link
Barrera, D., Kayacic, H. G., Oorschot, P. C., & Somayaji, A. (2010, October). A methodology for empirical analysis of permission-based security models and its application to android [Paper]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. External link
Barrera, D., & Oorschot, P. C. (2009, October). Security visualization tools and IPv6 addresses [Paper]. 6th International Workshop on Visualization for Cyber Security (VizSec 2009), Atlantic City, NJ. External link
McCarney, D., Barrera, D., Clark, J., Chiasson, S., & Oorschot, P. C. (2012, December). Tapas: design, implementation, and usability evaluation of a password manager [Paper]. 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida. External link
Mannan, M., Barrera, D., Brown, C. D., Lie, D., & Oorschot, P. C. (2011, February). Mercury: Recovering Forgotten Passwords Using Personal Devices [Paper]. 15th International Conference on Financial Cryptography and Data Security (FC 2011), Gros Islet, St. Lucia. External link
Skillen, A., Barrera, D., & Oorschot, P. C. (2013, November). Deadbolt: locking down android disk encryption [Paper]. ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Berlin, Germany. External link