Author of the publication

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content.

, , , and . CIT/IUCC/DASC/PICom, page 461-468. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content., , , and . CIT/IUCC/DASC/PICom, page 461-468. IEEE, (2015)A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate., , , , and . J. Cybersecur., 4 (1): tyy006 (2018)A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract., , , and . CRITIS, volume 6712 of Lecture Notes in Computer Science, page 153-156. Springer, (2010)Using Information Trustworthiness Advice in Decision Making., , , and . STAST, page 35-42. IEEE Computer Society, (2012)Predicting Graphical Passwords., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 23-35. Springer, (2015)Analysis of Dependencies in Critical Infrastructures., , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 18-29. Springer, (2011)Guidelines for usable cybersecurity: Past and present., , , and . CSS, page 21-26. IEEE, (2011)Critical Systems Validation and Verification with CSP and FDR., and . FM-Trends, volume 1641 of Lecture Notes in Computer Science, page 243-250. Springer, (1998)Programming in occam 2., and . Prentice Hall international series in computer science Prentice Hall, (1985)Building Confidence in Information-Trustworthiness Metrics for Decision Support., , , , and . TrustCom/ISPA/IUCC, page 535-543. IEEE Computer Society, (2013)