From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory., , , и . HAISA, том 593 из IFIP Advances in Information and Communication Technology, стр. 109-120. Springer, (2020)User Engagement with Chatbots: A Discursive Psychology Approach., и . CIU, стр. 52:1-52:4. ACM, (2020)Digital identity. Technology and Society Magazine, IEEE, 23 (3): 34--41 (2004)Human Implications of Technology., и . The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Panel Report: Open Code for Digital Government.. DG.O, Digital Government Research Center, (2003)Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies., и . SafeConfig@CCS, стр. 31-36. ACM, (2016)Cars, Condoms, and Facebook., и . ISC, том 7807 из Lecture Notes in Computer Science, стр. 280-289. Springer, (2013)Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations., , и . SOUPS @ USENIX Security Symposium, стр. 81-97. USENIX Association, (2020)Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)., , , , и . ACSAC, стр. 337-348. ACM, (2021)Spare the rod, spoil the network security? Economic analysis of sanctions online., и . eCrime, стр. 59-68. IEEE, (2015)