| 2019 | Cyber security fear appeals: unexpectedly complicated. Karen Renaud, Marc J. Dupuis |
| 2019 | Employing attack graphs for intrusion detection. Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth V. Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul L. Yu |
| 2019 | Everything-as-a-hack: claims-making for access to digital and social resources. Wolter Pieters |
| 2019 | FrameProv: towards end-to-end video provenance. Mansoor Ahmed-Rengers |
| 2019 | Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension. Filipo Sharevski, Paige Treebridge, Jessica Westbrook |
| 2019 | NSPW '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019 Marco Carvalho, Wolter Pieters, Elizabeth Stobert |
| 2019 | Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm. Fiona Westin, Sonia Chiasson |
| 2019 | Privacy controls for always-listening devices. Nathan Malkin, Serge Egelman, David A. Wagner |
| 2019 | Towards models for quantifying the known adversary. Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari |
| 2019 | Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Maria Tanczer |
| 2019 | Why Jenny can't figure out which of these messages is a covert information operation. Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse |