From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Phishing knowledge based user modelling in software design., , , и . SPLST, том 1525 из CEUR Workshop Proceedings, стр. 221-235. CEUR-WS.org, (2015)A usability test of whitelist and blacklist-based anti-phishing application., , и . MindTrek, стр. 195-202. ACM, (2012)Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance., , , , , и . VSMM, стр. 1-10. IEEE, (2016)Interactive Environment for Effective Cybersecurity Teaching and Learning., , , , и . ARES, стр. 69:1-69:9. ACM, (2023)Security Dashboard Design for Non-Experts in Sigfox-based Smart Spaces., , , , и . WF-IoT, стр. 1-6. IEEE, (2022)Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution., , , , , и . FMICS, том 9128 из Lecture Notes in Computer Science, стр. 128-145. Springer, (2015)Open Problems in Computer Virology., , и . J. Comput. Virol., 1 (3-4): 55-66 (2006)Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate?, , , и . Behav. Inf. Technol., 33 (11): 1136-1147 (2014)Tailored Security: Building Non-Repudiable Security Service Level Agreements, , , , , , и . IEEE Vehicular Technology Magazine, (2013)Learnings from the Finnish Game Industry., , и . VikingPLoP, стр. 12:1-12:25. ACM, (2016)