Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aligning Cyber-Security Training to Individual Cognitive Style., , , , , , and . HAISA, page 132-142. University of Plymouth, (2019)Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness., , and . HAISA, page 145-155. University of Plymouth, (2017)TBDD: A New Trust-based, DRL-driven Framework for Blockchain Sharding in IoT., , , , , , , , , and . CoRR, (2024)Using Process Mining to Formalise Service Level Agreement (SLA) Allocation., , , , and . SmartWorld/SCALCOM/UIC/ATC/IOP/SCI, page 671-676. IEEE, (2021)Capacity Analysis of Public Blockchain., , , , , , and . CoRR, (2021)IoT Device Lifecycle Management., , , , , , , , , and 1 other author(s). TrustCom, page 1865-1870. IEEE, (2023)Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?, , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 217-231. Springer, (2020)Matrix Platform: Empowering Smart Ports with Advanced Video Analytics for Enhanced Security, Safety, and Efficiency., , , , , , , , , and 1 other author(s). TrustCom, page 1822-1826. IEEE, (2023)Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness?, , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 232-249. Springer, (2020)Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals., , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 225-236. Springer, (2023)