Follow
Jasmine Bowers
Title
Cited by
Cited by
Year
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
1702017
* droid: Assessment and evaluation of android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Computing Surveys (CSUR) 49 (3), 1-30, 2016
672016
Regulators, mount up! analysis of privacy policies for mobile money services
J Bowers, B Reaves, IN Sherman, P Traynor, K Butler
Thirteenth symposium on usable privacy and security (SOUPS 2017), 97-114, 2017
492017
Sonar: Detecting SS7 redirection attacks with audio-based distance bounding
C Peeters, H Abdullah, N Scaife, J Bowers, P Traynor, B Reaves, K Butler
2018 IEEE Symposium on Security and Privacy (SP), 567-582, 2018
262018
The best way to a strong defense is a strong offense: Mitigating deanonymization attacks via iterative language translation
N Mack, J Bowers, H Williams, G Dozier, J Shelton
International Journal of Machine Learning and Computing 5 (5), 409, 2015
202015
Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife et al. 2016.* droid: Assessment and evaluation of Android application …
B Reaves, J Bowers, SA Gorski III
ACM Computing Surveys (CSUR) 49 (3), 55, 2016
152016
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators.
IN Sherman, JD Bowers, K McNamara Jr, JE Gilbert, J Ruiz, P Traynor
NDSS, 2020
132020
Kiss from a rogue: Evaluating detectability of pay-at-the-pump card skimmers
N Scaife, J Bowers, C Peeters, G Hernandez, IN Sherman, P Traynor, ...
2019 IEEE Symposium on Security and Privacy (SP), 1000-1014, 2019
122019
Characterizing security and privacy practices in emerging digital credit applications
J Bowers, IN Sherman, KRB Butler, P Traynor
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
112019
FinTechSec: Addressing the security challenges of digital financial services
P Traynor, K Butler, J Bowers, B Reaves
IEEE Security & Privacy 15 (5), 85-89, 2017
82017
Detecting SS7 redirection attacks with audio-based distance bounding
PG Traynor, C Peeters, BG Reaves, H Abdullah, K Butler, J Bowers, ...
US Patent 11,265,717, 2022
52022
* droid: Assessment and evaluation of android application analysis tools
B Reaves, J Bowers, SA Gorski III, O Anise, R Bobhate, R Cho, H Das, ...
ACM Comput. Surv 49 (3), 55, 0
5
Truly Visual Caller ID? An Analysis of Anti-Robocall Applications and their Accessibility to Visually Impaired Users
IN Sherman, JD Bowers, LL Laborde, JE Gilbert, J Ruiz, PG Traynor
2020 IEEE International Symposium on Technology and Society (ISTAS), 266-279, 2020
32020
On the Privacy and Security of Digital Finance Applications
J Bowers
University of Florida, 2020
2020
Mitigating Deanonymization Attacks via Iterative Language Translation for Social Networks
JD Bowers
North Carolina Agricultural and Technical State University, 2015
2015
in Fraud Detection
J Uduehi, J Bowers, P Chand, K Butler
The system can't perform the operation now. Try again later.
Articles 1–16