From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Meta-modelling for Ecosystems Security., , и . SimuTools, том 424 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 259-283. Springer, (2021)From MDP to POMDP and Back: Safety and Compositionality., , , и . ECC, стр. 1-6. IEEE, (2023)"It may be a pain in the backside but..." Insights into the resilience of business after GDPR., , и . NSPW, стр. 21-34. ACM, (2022)Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit., , , , , и . ICWSM, стр. 197-208. AAAI Press, (2023)Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)., , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 271-279. Springer, (2016)Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web., , , , , и . CoRR, (2018)Who Let The Trolls Out? Towards Understanding State-Sponsored Trolls., , , , , и . CoRR, (2018)Compositional Security Modelling - Structure, Economics, and Behaviour., , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 233-245. Springer, (2014)The U.S. Vulnerabilities Equities Process: An Economic Perspective., , и . GameSec, том 10575 из Lecture Notes in Computer Science, стр. 131-150. Springer, (2017)Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT., , , , , , и . USENIX Security Symposium, стр. 1541-1558. USENIX Association, (2023)