Author of the publication

A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections.

, and . SIGCSE, page 16-22. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections., and . SIGCSE, page 16-22. ACM, (2020)Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter., , and . TrustCom, page 1228-1235. IEEE, (2020)ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems., and . POLICY, page 61-69. IEEE Computer Society, (2012)Global perspectives on cybersecurity education for 2030: a case for a meta-discipline., , , , , , , and . ITiCSE (Companion), page 36-54. ACM, (2018)ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage., , , and . FPS, volume 10723 of Lecture Notes in Computer Science, page 189-205. Springer, (2017)Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection., , , and . TrustCom/BigDataSE, page 442-449. IEEE, (2019)Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems., , , , and . TrustCom/BigDataSE, page 1624-1627. IEEE, (2018)E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud., , and . FiCloud, page 135-144. IEEE Computer Society, (2015)Secure and Practical Searchable Encryption: A Position Paper., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 266-281. Springer, (2017)Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC., , and . ACM Conference on Computer and Communications Security, page 841-844. ACM, (2011)