Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

It's All About Power., , and . Information Security Management Handbook, 6th ed., Auerbach Publ./CRC Press, (2007)Catching the malicious insider.. Inf. Secur. Tech. Rep., 13 (4): 220-224 (2008)Information warfare - what is it?. Inf. Secur. Tech. Rep., 4 (3): 12-19 (1999)What evidence is left after disk cleaners?, and . Digital Investigation, 1 (3): 183-188 (2004)The impact of abrupt suspension of solar radiation management (termination effect) in experiment G2 of the Geoengineering Model Intercomparison Project (GeoMIP): THE TERMINATION EFFECT IN GEOMIP G2, , , , , , , , , and 8 other author(s). Journal of Geophysical Research: Atmospheres, 118 (17): 9743--9752 (September 2013)Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons Learned., , , , , , , , , and 26 other author(s). CoRR, (2022)A General Language Assistant as a Laboratory for Alignment., , , , , , , , , and 12 other author(s). CoRR, (2021)The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market., , , , , and . J. Digit. Forensics Secur. Law, 5 (4): 43-64 (2010)Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market., , and . J. Digit. Forensics Secur. Law, 3 (2): 55-70 (2008)The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market., , , and . J. Digit. Forensics Secur. Law, 3 (1): 5-24 (2008)