Author of the publication

To outsource or not: The impact of information leakage risk on information security strategy.

, , , , and . Inf. Manag., 57 (5): 103215 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption., , and . Sensors, 23 (3): 1164 (February 2023)Few Shot Medical Image Segmentation with Cross Attention Transformer., , , and . MICCAI (2), volume 14221 of Lecture Notes in Computer Science, page 233-243. Springer, (2023)A Regularized Neural Optimization Approach with Beta Densities for Blind Deconvolution., , and . WCSP, page 62-67. IEEE, (2023)An Approach for Scale Suspicious Network Events Detection., , , , , and . IEEE BigData, page 5854-5863. IEEE, (2019)The Replica Dataset: A Digital Replica of Indoor Spaces., , , , , , , , , and 20 other author(s). CoRR, (2019)An eye tracking study: positive emotional interface design facilitates learning outcomes in multimedia learning?, , , , , and . International Journal of Educational Technology in Higher Education, (July 2021)Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts., , , , , , , and . ISSTA, page 1157-1168. ACM, (2023)Neural Inertial Localization., , , , and . CVPR, page 6594-6603. IEEE, (2022)On Potentials of the Gamma Densities to Blind Face Hallucination., , , , and . CISP-BMEI, page 1-5. IEEE, (2023)Dual Discriminative Relative-of-Gaussians Prior for Blind Deblurring., , , and . ICDIP, page 74:1-74:5. ACM, (2023)