From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks., , , и . Conference on Information Security Management & Small Systems Security, том 200 из IFIP Conference Proceedings, стр. 87-98. Kluwer, (2001)Evaluation of Contextual and Game-Based Training for Phishing Detection., , , , , и . Future Internet, 14 (4): 104 (2022)A security education Q&A., и . Inf. Manag. Comput. Secur., 22 (2): 130-133 (2014)A National Certification Programme for Academic Degrees in Cyber Security., , , , , и . World Conference on Information Security Education, том 531 из IFIP Advances in Information and Communication Technology, стр. 133-145. Springer, (2018)Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers., и . HCI (27), том 8030 из Lecture Notes in Computer Science, стр. 217-225. Springer, (2013)Efficient Privacy-preserving User Identity with Purpose-based Encryption., , , и . ISNCC, стр. 1-8. IEEE, (2019)Information security policy compliance model in organizations., , и . Comput. Secur., (2016)Advanced user authentication for mobile devices., и . Comput. Secur., 26 (2): 109-119 (2007)Risk and restitution: Assessing how users establish online trust., , и . Comput. Secur., 25 (7): 486-493 (2006)The cybersecurity workforce and skills.. Comput. Secur., (2021)