| Tampering with motes: Real-world physical attacks on wireless sensor networks A Becher, Z Benenson, M Dornseif International Conference on Security in Pervasive Computing, 104-118, 2006 | 368 | 2006 |
| Realizing robust user authentication in sensor networks Z Benenson, N Gedicke, O Raivio Real-World Wireless Sensor Networks (REALWSN) 14 (52), 1-5, 2005 | 213 | 2005 |
| Cooperative intrusion detection in wireless sensor networks I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou European Conference on Wireless Sensor Networks, 263-278, 2009 | 149 | 2009 |
| Unpacking spear phishing susceptibility Z Benenson, F Gassmann, R Landwirth International conference on financial cryptography and data security, 610-627, 2017 | 108 | 2017 |
| Specifying IT security awareness N Hänsch, Z Benenson 2014 25th International workshop on database and expert systems applications …, 2014 | 103 | 2014 |
| User authentication in sensor networks Z Benenson, F Gärtner, D Kesdogan Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung …, 2004 | 92 | 2004 |
| Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning P Morgner, S Mattejat, Z Benenson, C Müller, F Armknecht Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017 | 85 | 2017 |
| Android and iOS users' differences concerning security and privacy Z Benenson, F Gassmann, L Reinfelder CHI'13 Extended Abstracts on Human Factors in Computing Systems, 817-822, 2013 | 83 | 2013 |
| All your bulbs are belong to us: Investigating the current state of security in connected lighting systems P Morgner, S Mattejat, Z Benenson arXiv preprint arXiv:1608.03732, 2016 | 74 | 2016 |
| Long-term observation on browser fingerprinting: Users’ trackability and perspective G Pugliese, C Riess, F Gassmann, Z Benenson Proceedings on Privacy Enhancing Technologies, 2020 | 73 | 2020 |
| Security update labels: Establishing economic incentives for security patching of IoT consumer products P Morgner, C Mai, N Koschate-Fischer, F Freiling, Z Benenson 2020 IEEE Symposium on Security and Privacy (SP), 429-446, 2020 | 72 | 2020 |
| Vulnerabilities and attacks in wireless sensor networks Z Benenson, PM Cholewinski, FC Freiling Wireless Sensors Networks Security 1, 22-43, 2008 | 68 | 2008 |
| TrustedPals: Secure multiparty computation implemented with smart cards M Fort, F Freiling, LD Penso, Z Benenson, D Kesdogan European Symposium on Research in Computer Security, 34-48, 2006 | 59 | 2006 |
| Security managers are not the enemy either L Reinfelder, R Landwirth, Z Benenson Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 52 | 2019 |
| User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. Z Benenson, A Girard, I Krontiris WEIS, 2015 | 52 | 2015 |
| Differences between Android and iPhone users in their security and privacy awareness L Reinfelder, Z Benenson, F Gassmann International conference on trust, privacy and security in digital business …, 2014 | 51 | 2014 |
| Authenticated query flooding in sensor networks Z Benenson, FC Freiling, E Hammerschmidt, S Lucks, L Pimenidis IFIP International Information Security Conference, 38-49, 2006 | 41 | 2006 |
| Privacy implications of room climate data P Morgner, C Müller, M Ring, B Eskofier, C Riess, F Armknecht, ... European Symposium on Research in Computer Security, 324-343, 2017 | 37 | 2017 |
| Shedding light on CVSS scoring inconsistencies: A user-centric study on evaluating widespread security vulnerabilities J Wunder, A Kurtz, C Eichenmüller, F Gassmann, Z Benenson 2024 IEEE Symposium on Security and Privacy (SP), 1102-1121, 2024 | 36 | 2024 |
| Attitudes to IT security when using a smartphone Z Benenson, O Kroll-Peters, M Krupp 2012 Federated Conference on Computer Science and Information Systems …, 2012 | 35 | 2012 |