Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

It's More Than Just Money: The Real-World Harms from Ransomware Attacks., , , , , , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 261-274. Springer, (2023)'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience., , , , , , and . J. Cybersecur., (January 2024)The Pragmatic Web: Agent-Based Multimodal Web Interaction with no Browser in Sight., and . INTERACT, IOS Press, (2003)Social-Technical Tools for Collaborative Sensemaking and Sketching., , , and . HCI (4), volume 5613 of Lecture Notes in Computer Science, page 614-623. Springer, (2009)Implications of Cloud Computing for People with Cognitive Disabilities., , and . HCI (6), volume 6766 of Lecture Notes in Computer Science, page 372-381. Springer, (2011)Mobile Technology for People with Cognitive Disabilities and Their Caregivers - HCI Issues., , and . HCI (5), volume 5614 of Lecture Notes in Computer Science, page 385-394. Springer, (2009)Between a rock and a hard(ening) place: Cyber insurance in the ransomware era., , , , , , and . Comput. Secur., (May 2023)EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments., , , , , and . CSET, USENIX Association, (2014)A Fast Algorithm for Solving Toeplitz Systems of Equations., and . ISCAS, page 373-376. IEEE, (1994)Deterministic Langevin Unconstrained Optimization with Normalizing Flows., and . CoRR, (2023)