From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Meta-modelling for Ecosystems Security., , и . SimuTools, том 424 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 259-283. Springer, (2021)From MDP to POMDP and Back: Safety and Compositionality., , , и . ECC, стр. 1-6. IEEE, (2023)Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)., , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 271-279. Springer, (2016)"It may be a pain in the backside but..." Insights into the resilience of business after GDPR., , и . NSPW, стр. 21-34. ACM, (2022)Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , и . ICWSM, стр. 197-208. AAAI Press, (2023)Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , и . CoRR, (2022)Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls., , , , , и . WebSci, стр. 353-362. ACM, (2019)2 Fast 2 Secure: A Case Study of Post-Breach Security Changes., , , и . EuroS&P Workshops, стр. 192-201. IEEE, (2019)On the Adoption of Privacy-enhancing Technologies., , и . GameSec, том 9996 из Lecture Notes in Computer Science, стр. 175-194. Springer, (2016)Modelling and simulating systems security policy., и . SimuTools, стр. 9-18. ICST/ACM, (2015)