Crowds: Anonymity for web transactions MK Reiter, AD Rubin ACM transactions on information and system security (TISSEC) 1 (1), 66-92, 1998 | 2949 | 1998 |
The relationship between addictive use of social media and video games and symptoms of psychiatric disorders: A large-scale cross-sectional study. CS Andreassen, J Billieux, MD Griffiths, DJ Kuss, Z Demetrovics, ... Psychology of Addictive Behaviors 30 (2), 252, 2016 | 1652 | 2016 |
Internet addiction: A systematic review of epidemiological research for the last decade D J Kuss, M D Griffiths, L Karila, J Billieux Current pharmaceutical design 20 (25), 4026-4052, 2014 | 1590 | 2014 |
Zerocoin: Anonymous distributed e-cash from bitcoin I Miers, C Garman, M Green, AD Rubin 2013 IEEE symposium on security and privacy, 397-411, 2013 | 1369 | 2013 |
The design and analysis of graphical passwords I Jermyn, A Mayer, F Monrose, MK Reiter, A Rubin 8th USENIX Security Symposium (USENIX Security 99), 1999 | 1203 | 1999 |
Keystroke dynamics as a biometric for authentication F Monrose, AD Rubin Future Generation computer systems 16 (4), 351-359, 2000 | 1103 | 2000 |
Can disordered mobile phone use be considered a behavioral addiction? An update on current evidence and a comprehensive model for future research J Billieux, P Maurage, O Lopez-Fernandez, DJ Kuss, MD Griffiths Current Addiction Reports 2 (2), 156-162, 2015 | 1094 | 2015 |
The role of impulsivity in actual and problematic use of the mobile phone J Billieux, M Van der Linden, L Rochat Applied Cognitive Psychology: The Official Journal of the Society for …, 2008 | 921 | 2008 |
Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance O Király, MN Potenza, DJ Stein, DL King, DC Hodgins, JB Saunders, ... Comprehensive psychiatry 100, 152180, 2020 | 908 | 2020 |
Are we overpathologizing everyday life? A tenable blueprint for behavioral addiction research J Billieux, A Schimmenti, Y Khazaal, P Maurage, A Heeren Journal of behavioral addictions 4 (3), 119-123, 2015 | 867 | 2015 |
Problematic use of the mobile phone: A literature review and a pathways model J Billieux Current Psychiatry Reviews 8 (4), 299-307, 2012 | 858 | 2012 |
Analysis of an electronic voting system T Kohno, A Stubblefield, AD Rubin, DS Wallach IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 27-40, 2004 | 832 | 2004 |
Problematic online gaming and the COVID-19 pandemic DL King, PH Delfabbro, J Billieux, MN Potenza Journal of behavioral addictions 9 (2), 184-186, 2020 | 771 | 2020 |
How can we conceptualize behavioural addiction without pathologizing common behaviours? D Kardefelt‐Winther, A Heeren, A Schimmenti, A Van Rooij, P Maurage, ... Addiction 112 (10), 1709-1715, 2017 | 751 | 2017 |
Authentication via keystroke dynamics F Monrose, A Rubin Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 749 | 1997 |
A framework for detection and measurement of phishing attacks S Garera, N Provos, M Chew, AD Rubin Proceedings of the 2007 ACM workshop on Recurring malcode, 1-8, 2007 | 706 | 2007 |
Charm: a framework for rapidly prototyping cryptosystems JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ... Journal of Cryptographic Engineering 3, 111-128, 2013 | 691 | 2013 |
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. A Stubblefield, J Ioannidis, AD Rubin NDSS, 2002 | 558 | 2002 |
The four horsemen of fear: An integrated model of understanding fear experiences during the COVID-19 pandemic A Schimmenti, J Billieux, V Starcevic Clinical neuropsychiatry 17 (2), 41, 2020 | 541 | 2020 |
Why do you play World of Warcraft? An in-depth exploration of self-reported motivations to play online and in-game behaviours in the virtual world of Azeroth J Billieux, M Van der Linden, S Achab, Y Khazaal, L Paraskevopoulos, ... Computers in Human Behavior 29 (1), 103-109, 2013 | 503 | 2013 |