Follow
Su Mon Kywe
Su Mon Kywe
Security Manager
Verified email at nhg.com.sg
Title
Cited by
Cited by
Year
On Recommending Hashtags in Twitter Networks
SM Kywe, TA Hoang, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
2092012
Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
C Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
1642015
A Survey of Recommender Systems in Twitter
SM Kywe, EP Lim, F Zhu
The 4th International Conference on Social Informatics (SocInfo 2012), 2012
1242012
Launching generic attacks on ios with approved third-party applications
J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou
International Conference on Applied Cryptography and Network Security, 272-289, 2013
352013
Detecting camouflaged applications on mobile application markets
SM Kywe, Y Li, RH Deng, J Hong
International Conference on Information Security and Cryptology, 241-254, 2014
212014
Batch Clone Detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
182014
Security Issues of In-Store Mobile Payment
X Yu, SM Kywe, Y Li
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2, 115-144, 2017
162017
Attacking android smartphone systems without permissions
SM Kywe, Y Li, K Petal, M Grace
Privacy, Security and Trust (PST), 2016 14th Annual Conference on, 147-156, 2016
162016
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
162012
Poster: Usability Analysis of Biometric Authentication Systems on Mobile Phones
K Iacovino, SM Kywe, LF Cranor, B Ur
9*
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
82014
Dissecting developer policy violating apps: characterization and detection
SM Kywe, Y Li, J Hong, C Yao
Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016
62016
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service
SM Kywe, Y Li, J Shi
RFID-Technologies and Applications (RFID-TA), 2013 IEEE International …, 2013
52013
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
MK SU
Singapore Management University, 2016
2016
ENVIRONMENTAL MANAGEMENT STUDY IN CENTRAL MYANMAR
S Wynn, SM Kywe, W Maung
Selected Student Research Projects of the 5th Search for SEAMEO Young …, 0
The system can't perform the operation now. Try again later.
Articles 1–15