From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , и . CyberSA, стр. 1-8. IEEE, (2020)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , и 4 other автор(ы). CoRR, (2021)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , и . PrimeLife, том 320 из IFIP Advances in Information and Communication Technology, стр. 246-258. Springer, (2009)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , и . PrimeLife, том 352 из IFIP Advances in Information and Communication Technology, стр. 271-282. Springer, (2010)Can Cognitive Science Help Us Make Online Risk More Tangible?., и . IEEE Intelligent Systems, 24 (6): 32-36 (2009)Trustworthy and effective communication of cybersecurity risks: A review., , , и . STAST, стр. 60-68. IEEE, (2011)A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing., , и . Cyber Security, стр. 1-9. IEEE, (2019)Applying Semantic Technologies to Fight Online Banking Fraud., , и . EISIC, стр. 61-68. IEEE Computer Society, (2015)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , и . STAST, стр. 8-15. IEEE Computer Society, (2014)Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment., , и . CRITIS, том 7722 из Lecture Notes in Computer Science, стр. 155-167. Springer, (2012)