Author of the publication

Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime.

, , , and . TrustCom/BigDataSE, page 1242-1249. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Agent Approach to Testing Anti-Spam Software., , and . DEXA Workshops, page 38-42. IEEE Computer Society, (2009)Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics., and . SOUPS, page 163-173. USENIX Association, (2017)U-PriSM 2: the second usable privacy and security for mobile devices workshop., , , and . Mobile HCI, page 630-632. ACM, (2013)Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime., , , and . TrustCom/BigDataSE, page 1242-1249. IEEE, (2018)Using image saliency and regions of interest to encourage stronger graphical passwords., and . ACSAC, page 127-138. ACM, (2016)Kwyjibo: automatic domain name generation., and . Softw. Pract. Exp., 38 (14): 1561-1567 (2008)Invisible, Passive, Continuous and Multimodal Authentication., and . MSSP, volume 8045 of Lecture Notes in Computer Science, page 34-41. Springer, (2010)Spamulator: the Internet on a laptop., , and . ITiCSE, page 142-147. ACM, (2008)Keystroke dynamics: Characteristics and opportunities.. PST, page 205-212. IEEE, (2010)Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices., , and . SP (Workshops), page 104-109. IEEE, (2020)