Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Human Factors Ontology for Cyber Security., , , and . STIDS, volume 1523 of CEUR Workshop Proceedings, page 26-33. CEUR-WS.org, (2015)Development of decision rationale in complex group decision making., , , , and . CHI, page 1341-1350. ACM, (2009)VulnerVAN: A Vulnerable Network Generation Tool., , , , , , , , , and 2 other author(s). MILCOM, page 1-6. IEEE, (2019)On Detecting Manifestation of Adversary Characteristics., , , , , , , , and . MILCOM, page 431-437. IEEE, (2018)Reviving community networks: hyperlocality and suprathresholding in Web 2.0 designs., , , and . Pers. Ubiquitous Comput., 19 (2): 477-491 (2015)Community Network 2.0: Visions, Participation, and Engagement in New Information Infrastructures., , , , , and . IS-EUD, volume 6654 of Lecture Notes in Computer Science, page 270-275. Springer, (2011)Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization., , , and . Comput. Secur., (2021)Exploring design as a research activity., , , , , and . Conference on Designing Interactive Systems, page 365-366. ACM, (2006)Evaluating the BOLT Application: Supporting Human Observation, Metrics, and Cognitive Work Analysis., , , , and . AHFE (10), volume 268 of Lecture Notes in Networks and Systems, page 247-255. Springer, (2021)CiVicinity events: pairing geolocation tools with a community calendar., , , and . COM.Geo, page 14. ACM, (2012)