Author of the publication

Human behaviour as an aspect of cybersecurity assurance.

, , , and . Secur. Commun. Networks, 9 (17): 4667-4679 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Posttranslational regulation impacts the fate of duplicated genes, , , , , and . Proceedings of the National Academy of Sciences, 107 (7): 2967--2971 (Feb 16, 2010)Integrated Networking, Caching, and Computing for Connected Vehicles: A Deep Reinforcement Learning Approach., , and . IEEE Trans. Vehicular Technology, 67 (1): 44-55 (2018)Entity Linking: An Issue to Extract Corresponding Entity With Knowledge Base., , and . IEEE Access, (2018)Randomly Projected KD-Trees with Distance Metric Learning for Image Retrieval., , , and . MMM (2), volume 6524 of Lecture Notes in Computer Science, page 371-382. Springer, (2011)Geodesic Centroidal Voronoi Tessellations: Theories, Algorithms and Applications., , , , and . CoRR, (2019)Trust management for secure cognitive radio vehicular ad hoc networks., , , and . Ad Hoc Networks, (2019)Lightweight preprocessing and fast query of geodesic distance via proximity graph., , , , , , and . Comput. Aided Des., (2018)Efficiently computing geodesic offsets on triangle meshes by the extended Xin-Wang algorithm., , and . Comput. Aided Des., 43 (11): 1468-1476 (2011)An Optimization-Based Truth Discovery Method with Claim Relation., , , , and . ICBK, page 289-295. IEEE, (2019)An efficient and stable spectral method for electromagnetic scattering from a layered periodic structure., , and . J. Comput. Phys., 231 (8): 3007-3022 (2012)