Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganographic Transports: A Vector for Hidden Secret Internets?, and . TrustCom/BigDataSE, page 891-896. IEEE, (2018)Editorial for FGCS special issue: Big Data in the cloud., , , , , and . Future Gener. Comput. Syst., (2016)A Comparative Analysis of Distributed Ledger Technology Platforms., , , , , , and . IEEE Access, (2019)Privacy-preserving cooperative localization in vehicular edge computing infrastructure., , , , , , , and . Concurr. Comput. Pract. Exp., (2022)Why do users trust the wrong messages? A behavioural model of phishing.. eCrime, page 1-7. IEEE, (2009)Maximising Eyeballs but Facilitating Cybercrime? Ethical Challenges for Online Advertising in New Zealand., , and . HICSS, page 1742-1749. IEEE Computer Society, (2015)Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation., , , , , , and . Comput. Secur., (November 2023)The Inadequacy of Entropy-Based Ransomware Detection., , , and . ICONIP (5), volume 1143 of Communications in Computer and Information Science, page 181-189. Springer, (2019)Responsibility Attribution Against Data Breaches., , , , , , and . ICIoT, page 498-503. IEEE, (2020)Significance of Phonological Features in Speech Emotion Recognition., , , , and . Int. J. Speech Technol., 23 (3): 633-642 (2020)