Author of the publication

aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions.

, , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semi-Supervised Approach to Message Stance Classification., , , and . IEEE Trans. Knowl. Data Eng., 32 (1): 1-11 (2020)Guidelines for usable cybersecurity: Past and present., , , and . CSS, page 21-26. IEEE, (2011)Mapping the coverage of security controls in cyber insurance proposal forms., , , and . J. Internet Serv. Appl., 8 (1): 8:1-8:13 (2017)A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate., , , , and . J. Cybersecur., 4 (1): tyy006 (2018)A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK., , and . World Conference on Information Security Education, volume 503 of IFIP Advances in Information and Communication Technology, page 110-120. Springer, (2017)Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content., , , and . CIT/IUCC/DASC/PICom, page 461-468. IEEE, (2015)A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models., , and . MIST@CCS, page 47-56. ACM, (2016)Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home., , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 255-267. Springer, (2016)Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things., , and . CoRR, (2020)A Survey of User Perspectives on Security and Privacy in a Home Networking Environment., , and . CoRR, (2022)