Author of the publication

How the Presence of Cognitive Biases in Phishing Emails Affects Human Decision-Making?

, , , and . ICONIP (5), volume 1792 of Communications in Computer and Information Science, page 550-560. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Use Cases for Snort: Cloud and Mobile Environments., and . CoRR, (2018)Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing., and . ICDCIT, volume 10722 of Lecture Notes in Computer Science, page 280-287. Springer, (2018)DC Microgrid Protection., , , , and . ICIMMI, page 71:1-71:5. ACM, (2022)Orchestrating 'Institutional Network' for the Sustainability of IS Program: Evidence from Indian Public Healthcare., , , and . ICIS, Association for Information Systems, (2023)A Discursive Perspective on the Organizational Field Formation Process: Issues of Information Technology in Indian Healthcare.. SIGMIS-CPR, page 89-95. ACM, (2017)Sampled time domain analysis of digital pulse width modulation for feedback controlled converters., and . IET Circuits Devices Syst., 10 (6): 481-491 (2016)ScaleMed: A methodology for iterative mHealth clinical trials., , , and . HealthCom, page 139-143. IEEE, (2015)Uplink and Downlink Performance Bounds for Full Duplex Cellular Networks., , , and . BlackSeaCom, page 1-6. IEEE, (2020)SAM Fewshot Finetuning for Anatomical Segmentation in Medical Images., , , , and . CoRR, (2024)Whitespace networks for vehicular communication., , , , , and . COMSNETS, page 1-2. IEEE, (2013)