Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Humans Are Dynamic - Our Tools Should Be Too., , , , , and . IEEE Internet Comput., 21 (3): 40-46 (2017)Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach., , and . IEEE Trans. Inf. Forensics Secur., 8 (6): 838-852 (2013)Aggregating vulnerability metrics in enterprise networks using attack graphs., , , , , , and . J. Comput. Secur., 21 (4): 561-597 (2013)A theory of utility and privacy of data sources., , and . ISIT, page 2642-2646. IEEE, (2010)A Theory of Privacy and Utility in Databases, , and . CoRR, (2011)Smart Meter Privacy: A Theoretical Framework., , , and . IEEE Trans. Smart Grid, 4 (2): 837-846 (2013)The Human Capital Model for Security Research: New Insights into Technology Transition.. CODASPY, page 171-172. ACM, (2017)An Anthropological Approach to Studying CSIRTs., , , , and . IEEE Secur. Priv., 12 (5): 52-60 (2014)Guest Editors' Introduction: Circuits and Systems for VLSI IoT Devices., , and . IEEE Des. Test, 36 (4): 5 (2019)A Human Capital Model for Mitigating Security Analyst Burnout., , , , , , and . SOUPS, page 347-359. USENIX Association, (2015)