Sign in

Crowdsourced Exploration of Security Configurations.

Qatrunnada IsmailTousif AhmedApu KapadiaMichael K. Reiter
Published in: CHI (2015)
Keyphrases