Personal profile


I earned my PhD in Computer Science from Carleton University (Ottawa, Canada) in 1998 under the direction of Paul Van Oorschot and Evangelos Kranakis. From 1998 till 2002 I was a Research Scientist at Entrust, a security software company, where I performed code security reviews, contributed to new product developments and created new IETF and W3C standards, primarily related to authentication and key management. From 2002 till 2008 I worked for the Government of Canada. In 2003, I designed the "account recovery" interface for the Government Online portal, used by more than six million citizens. I also contributed to design of the portal's "epass" authentication service. In 2008 I made the leap to full-time academic work, where I continue to build on my usable security research, as well as applying machine learning to security. I started as a Research Fellow at the University of Edinburgh in 2008, then in 2010 I became a Lecturer and then Senior Lecturer at Glasgow Caledonian University, and in 2015 I moved to Heriot-Watt University as an Associate Professor.

Research interests

I am primarily interested in computer security, and in applying human-computer interaction (HCI) and machine learning (ML) techniques to solve computer security problems. I also apply fundamental security techniques to design, and attack modelling and analysis. For example, I have enumerated the attack space for partial passwords and the answers to challenge questions, and I have modelled attacks to implicit smartphone authentication. The results of my research include critical evaluations of current security solutions, the establishment of new security and usability methodologies, and the design of new security techniques. I currently apply these methods and techniques to authentication protocols, and mobile devices and networks, though I am very interested in broader applications of my research.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Authentication Engineering & Materials Science
Usability Mathematics
Mobile devices Engineering & Materials Science
Privacy Mathematics
Information use Engineering & Materials Science
Signature verification Mathematics
Avatar Mathematics
Network security Mathematics

Co Author Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1994 2018

Experimental large-scale review of attractors for detection of potentially unwanted applications

Stavova, V., Dedkova, L., Matyas, V., Just, M., Smahel, D. & Ukrop, M. 12 Mar 2018 In : Computers and Security.

Research output: Contribution to journalArticle

Computer systems

Everything's Cool: Extending Security Warnings with Thermal Feedback

Wilson, G., Maxwell, H. & Just, M. 11 Feb 2017 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM

Research output: Chapter in Book/Report/Conference proceedingConference contribution

visual cue
Association measure
Association reactions

Factors influencing the purchase of security software for mobile devices - Case study

Stavova, V., Matyas, V., Just, M. & Ukrop, M. Mar 2017 In : Infocommunications Journal. 9, 1, p. 18-23 6 p.

Research output: Contribution to journalArticle

Mobile devices
Mobile security

Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism

Just, M. & Berg, T. 21 Sep 2017 Human-Computer Interaction - INTERACT 2017: 16th IFIP TC 13 International Conference Mumbai, India, September 25–29, 2017 Proceedings, Part III. Springer, p. 34-53 20 p. (Lecture Notes in Computer Science; vol. 10515)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
group discussion

Stop Annoying Me! An Empirical Investigation of the Usability of App Privacy Notifications

Micallef, N., Just, M., Baillie, L. & Alharby, M. 2017 Proceedings of the 29th Australian Conference on Human-Computer Interaction. ACM, p. 371-375 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs

Activities 2014 2017

  • 11 Participation in conference
  • 3 Invited talk
  • 1 Other

2nd IEEE European Symposium on Security and Privacy

Just, M. (Member of programme committee)
26 Apr 201728 Apr 2017

Activity: Participation in conference

New Security Paradigms Workshop 2016

Just, M. (Member of programme committee)
26 Sep 201629 Sep 2016

Activity: Participation in conference

Symposium on Usable Privacy and Security

Just, M. (Member of programme committee)
22 Jul 201624 Jul 2016

Activity: Participation in conference

Invited talk at Dalhousie University

Just, M. (Speaker)
12 Jul 2016

Activity: Invited talk

Press / Media

Internet Security - What you need to know

Mike Just


1 media contribution

Press / Media: Research

Phone thwarts thieves by learning its owner’s habits

Mike Just


1 media contribution

Press / Media: Research

“Sensors help keep smartphone data secure”

Mike Just


1 media contribution

Press / Media: Research