From post

SeBeST: Security Behavior Stage Model and Its Application to OS Update.

, , , и . AINA (2), том 226 из Lecture Notes in Networks and Systems, стр. 552-566. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack., , , , , и . SEC, том 562 из IFIP Advances in Information and Communication Technology, стр. 3-18. Springer, (2019)Kernel-based Behavior Analysis for Android Malware Detection., , и . CIS, стр. 1011-1015. IEEE Computer Society, (2011)Anonymous and analysable web browsing., , и . IPCCC, стр. 1-8. IEEE Computer Society, (2017)Robust ORAM: Enhancing Availability, Confidentiality and Integrity., , , , и . PRDC, стр. 30-39. IEEE Computer Society, (2017)Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks., , , , , и . CoRR, (2023)Identification of an IoT Device Model in the Home Domain Using IPFIX Records., , , и . COMPSAC, стр. 583-592. IEEE, (2022)On recruiting and retaining users for security-sensitive longitudinal measurement panels., , , , , , и . SOUPS @ USENIX Security Symposium, стр. 347-366. USENIX Association, (2022)On the implementation of path-based dynamic pricing in edge-directed routing., , , , , , и . APCC, стр. 254-260. IEEE, (2016)Understanding the time-series behavioral characteristics of evolutionally advanced email spammers., , и . AISec, стр. 71-80. ACM, (2012)Ephemeral UUID for Protecting User Privacy in Mobile Advertisements., , , и . DEXA (2), том 8645 из Lecture Notes in Computer Science, стр. 263-272. Springer, (2014)