Author of the publication

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes.

, , , and . CHI, page 570. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mirkovic, Jelena
add a person with the name Mirkovic, Jelena
 

Other publications of authors with the same name

Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise., , , , , , and . IEEE Trans. Computers, 57 (8): 1098-1112 (2008)Genetic Search Based on Multiple Mutations., , and . IEEE Computer, 33 (11): 118-119 (2000)Collaborative DoS Defenses.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed., , , , , , , , and . TRIDENTCOM, page 1-7. IEEE, (2007)Performance evaluation for IEEE 802.11G hot spot coverage using sectorised antennas., , , , and . PIMRC, page 1460-1465. IEEE, (2004)Teaching Cybersecurity with DeterLab., and . IEEE Security & Privacy, 10 (1): 73-76 (2012)Good Automatic Authentication Question Generation., , and . INLG, page 203-206. The Association for Computer Linguistics, (2016)Leveraging Semantic Transformation to Investigate Password Habits and Their Causes., , , and . CHI, page 570. ACM, (2018)Measuring denial Of service., , , , , , and . QoP, page 53-58. ACM, (2006)Defending Web Servers Against Flash Crowd Attacks., , , , , and . ICNP, page 1-2. IEEE, (2019)