Author of the publication

Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges.

, , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 1-3 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals., and . J. Univers. Comput. Sci., 24 (5): 634-645 (2018)Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 1-3 (2021)The role of information sensitivity in adoption of E2EE communication software., , , and . EICC, page 10:1-10:2. ACM, (2020)Obligation to Defend the Critical Infrastructure? Offensive Cybersecurity Measures., and . J. Univers. Comput. Sci., 24 (5): 646-661 (2018)Cybersecurity competence of older adult users of mobile devices., , , and . CoRR, (2024)Security and Privacy Issues of Home Globalization., , , and . IEEE Secur. Priv., 20 (1): 10-11 (2022)Know Your Enemy: User Segmentation Based on Human Aspects of Information Security., , and . IEEE Access, (2021)Cyberattack Detection and Response., , , , and . J. Univers. Comput. Sci., 25 (11): 1394-1395 (2019)Testing the Human Backdoor: Organizational Response to a Phishing Campaign., , , and . J. Univers. Comput. Sci., 25 (11): 1458-1477 (2019)Why people replace their aging smart devices: A push-pull-mooring perspective., , , and . Comput. Secur., (2023)