| Usable security: Why do we need it? How do we get it? MA Sasse, I Flechais O'Reilly, 2005 | 269 | 2005 |
| Security and usability: Analysis and evaluation R Kainda, I Flechais, AW Roscoe 2010 international conference on availability, reliability and security, 275-282, 2010 | 241 | 2010 |
| Persona cases: a technique for grounding personas S Faily, I Flechais Proceedings of the SIGCHI conference on human factors in computing systems …, 2011 | 185 | 2011 |
| Digital deception: Generative artificial intelligence in social engineering and phishing M Schmitt, I Flechais Artificial Intelligence Review 57 (12), 324, 2024 | 183 | 2024 |
| Usability and security of out-of-band channels in secure device pairing protocols R Kainda, I Flechais, AW Roscoe Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009 | 177 | 2009 |
| Bringing security home: a process for developing secure and usable systems I Flechais, MA Sasse, SMV Hailes Proceedings of the 2003 workshop on New security paradigms, 49-57, 2003 | 161 | 2003 |
| Integrating security and usability into the requirements and design process I Flechais, C Mascolo, MA Sasse International Journal of Electronic Security and Digital Forensics 1 (1), 12-26, 2007 | 148 | 2007 |
| “It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products G Chalhoub, MJ Kraemer, N Nthala, I Flechais Proceedings of the 2021 CHI conference on human factors in computing systems …, 2021 | 107 | 2021 |
| Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey LH Nguyen, AW Roscoe Journal of Computer Security 19 (1), 139-201, 2011 | 105 | 2011 |
| Designing secure and usable systems I Fléchais | 91 | 2005 |
| Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems I Flechais, J Riegelsberger, MA Sasse Proceedings of the 2005 workshop on New security paradigms, 33-41, 2005 | 86 | 2005 |
| Maintainability prediction: A regression analysis of measures of evolving systems JH Hayes, L Zhao 21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005 | 70 | 2005 |
| Barry is not the weakest link: Eliciting Secure System Requirements with Personas S Faily, I Fléchais | 63 | 2010 |
| Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science I Flechais, MA Sasse International Journal of Human-Computer Studies 67 (4), 281-296, 2009 | 62 | 2009 |
| Informal support networks: an investigation into home data security practices N Nthala, I Flechais Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 63-82, 2018 | 61 | 2018 |
| Here's Johnny: a methodology for developing attacker personas A Atzeni, C Cameroni, S Faily, J Lyle, I Fléchais 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 59 | 2011 |
| “Alexa, are you spying on me?”: Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users G Chalhoub, I Flechais International conference on human-computer interaction, 305-325, 2020 | 58 | 2020 |
| Security practices for households bank customers in the Kingdom of Saudi Arabia D Alghamdi, I Flechais, M Jirotka Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 297-308, 2015 | 57 | 2015 |
| A meta-model for usable secure requirements engineering S Faily, I Fléchais Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 54 | 2010 |
| The secret lives of assumptions: Developing and refining assumption personas for secure system design S Faily, I Fléchais International Conference on Human-Centred Software Engineering, 111-118, 2010 | 49 | 2010 |