Author of the publication

The Self-Efficacy Variable in Behavioral Information Security Research.

, , and . ES, page 28-32. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework., , , , and . Int. J. Comput. Intell. Appl., 18 (4): 1950022:1-1950022:16 (2019)A Survey of Attacks and Defenses for Deep Neural Networks., , and . CSR, page 254-261. IEEE, (2023)An Analysis of COVID-19 related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms., , and . ICAIC, page 1-6. IEEE, (2022)IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework., , and . ICAIC, page 1-6. IEEE, (2022)Using packet sniffer simulator in the class: experience and evaluation., , , , and . ACM Southeast Regional Conference, page 116-121. ACM, (2007)Designing an SOA-Based Earthquake Forewarning System using BPMN., and . Software Engineering Research and Practice, page 593-598. CSREA Press, (2010)Ultrasonic Diagnosis and Analysis of the Effect of Labor Analgesia on Early Pelvic Floor Function and Pelvic Floor Dysfunction., , , and . J. Medical Imaging Health Informatics, 11 (7): 1903-1910 (2021)Security Labs for Software Defined Networks in CloudLab., , and . SIGCSE, page 1235. ACM, (2019)A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 239-249. Springer, (2018)A course module on web tracking and privacy., , , , and . InfoSecCD, page 10:1-10:7. ACM, (2015)