Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The battle against phishing: Dynamic Security Skins., and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 77-88. ACM, (2005)CITRIC: A low-bandwidth wireless camera network platform., , , , , , , , , and 5 other author(s). ICDSC, page 1-10. IEEE, (2008)Remote Operating System Classification over IPv6., , , , and . AISec@CCS, page 57-67. ACM, (2015)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 394-395. Springer, (2008)Security Analytics in the Context of Adversarial Machine Learning.. IWSPA@CODASPY, page 49. ACM, (2016)The Impact of Procedural Security Countermeasures on Employee Security Behaviour: A Qualitative Study., , and . ISD, Association for Information Systems, (2017)Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Investigation of Employee Security Behaviour: A Grounded Theory Approach., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 283-296. Springer, (2015)The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study., , , and . HAISA, page 33-44. University of Plymouth, (2016)Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication., , and . NDSS, The Internet Society, (2009)