Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Defined Privacy., , , and . IC2E Workshops, page 25-29. IEEE Computer Society, (2016)Validating Cloud Infrastructure Changes by Cloud Audits., , , , , and . SERVICES, page 377-384. IEEE Computer Society, (2012)A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 590-595. Springer, (2006)Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A Review., , , and . CERC, volume 2348 of CEUR Workshop Proceedings, page 69-80. CEUR-WS.org, (2019)Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes., , , , and . TrustBus, volume 9264 of Lecture Notes in Computer Science, page 153-168. Springer, (2015)Assessing the Usability of End-User Security Software., , , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 177-189. Springer, (2010)Awareness, behaviour and culture: The ABC in cultivating security compliance., , and . ICITST, page 90-94. IEEE, (2015)Transparent authentication systems for mobile device security: A review., , and . ICITST, page 406-413. IEEE, (2015)Investigating the problem of IDS false alarms: An experimental study using Snort., , , and . SEC, volume 278 of IFIP, page 253-267. Springer, (2008)An Evaluation of Behavioural Profiling on Mobile Devices., , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 330-339. Springer, (2014)