From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences., и . GameSec, том 8840 из Lecture Notes in Computer Science, стр. 246-265. Springer, (2014)A Democracy Called Facebook? Participation as a Privacy Strategy on Social Media., , и . APF, том 11079 из Lecture Notes in Computer Science, стр. 91-108. Springer, (2018)Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting., , , и . eCrime, стр. 1-10. IEEE, (2019)How many down?: toward understanding systematic risk in networks., , и . AsiaCCS, стр. 495-500. ACM, (2014)A Multi-Region Investigation of the Perceptions and Use of Smart Home Devices., , , и . Proc. Priv. Enhancing Technol., 2022 (3): 6-32 (2022)Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder., , и . Proc. Priv. Enhancing Technol., 2022 (1): 481-500 (2022)AI-Competent Individuals and Laypeople Tend to Oppose Facial Analysis AI., , , , и . EAAMO, стр. 9:1-9:12. ACM, (2022)Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem., , , , , , , и . USENIX Security Symposium, стр. 2275-2291. USENIX Association, (2023)Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents., , и . WEIS, (2008)Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance., , , и . WEIS, (2012)