From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits., , , , и . BADGERS@ESORICS, стр. 56-65. IEEE, (2014)Local Government ICT Platform Standardization Activities of ICT Systems and Services for Offering High Value-added Service by Interacting Local Governments, Regional Institutions and Private Sector., , , , , , , и . II3E, том 286 из IFIP Advances in Information and Communication Technology, стр. 315-326. Springer, (2008)Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification., , и . ICONIP (3), том 9491 из Lecture Notes in Computer Science, стр. 223-232. Springer, (2015)PhishCage: reproduction of fraudulent websites in the emulated internet., , , и . SimuTools, стр. 242-247. ICST/ACM, (2013)New LDoS Attack in Zigbee Network and its Possible Countermeasures., , , и . SMARTCOMP, стр. 246-251. IEEE, (2021)A comparative study of smartphone-user security perception and preference towards redesigned security notifications., , , , и . AfriCHI, стр. 17:1-17:6. ACM, (2018)The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan., , , , и . PST, стр. 1-11. IEEE Computer Society, (2018)An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation., , , и . ISCC, стр. 378-385. IEEE Computer Society, (2006)An Independent Evaluation of Web Timing Attack and its Countermeasure., , , и . ARES, стр. 1319-1324. IEEE Computer Society, (2008)Task and Instance Quadratic Ordering for Active Online Multitask Learning., , , , и . ICONIP (3), том 11303 из Lecture Notes in Computer Science, стр. 435-447. Springer, (2018)