From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , и . CyberSA, стр. 1-8. IEEE, (2020)IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond., , , , и . IT Prof., 25 (5): 17-19 (сентября 2023)#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives., , и . EuroS&P Workshops, стр. 438-447. IEEE, (2020)A framework for effective corporate communication after cyber security incidents., и . Comput. Secur., (2020)Behind the Mask: A Computational Study of Anonymous' Presence on Twitter., , и . ICWSM, стр. 327-338. AAAI Press, (2020)The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter., , и . ICWSM Workshops, (2021)BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business., и . ICIW, стр. 286-291. IEEE Computer Society, (2009)The anatomy of online deception: what makes automated text convincing?, , и . SAC, стр. 1115-1120. ACM, (2016)Trustworthy and effective communication of cybersecurity risks: A review., , , и . STAST, стр. 60-68. IEEE, (2011)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , и . STAST, стр. 8-15. IEEE Computer Society, (2014)