Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hodges, Duncan
add a person with the name Hodges, Duncan
 

Other publications of authors with the same name

User Identification Using Games., and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 3-14. Springer, (2016)Reconstructing What You Said: Text Inference Using Smartphone Motion., and . IEEE Trans. Mob. Comput., 18 (4): 947-959 (2019)Pathways to identity: using visualization to aid law enforcement in identification tasks., , , , , , and . Security Informatics, 3 (1): 12 (2014)Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords., , , and . Cyberpsy., Behavior, and Soc. Networking, 18 (1): 3-7 (2015)Breaking the Arc: Risk control for Big Data., and . BigData, page 613-621. IEEE Computer Society, (2013)Keystroke Inference Using Smartphone Kinematics., , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 226-238. Springer, (2017)Utility evaluation of models., , , , , and . BELIV, page 160-167. ACM, (2014)What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces., , and . CHI Extended Abstracts, page 799-804. ACM, (2013)Image Choice to Represent the Self in Different Online Environments., , , and . HCI (22), volume 8531 of Lecture Notes in Computer Science, page 528-537. Springer, (2014)Predicting Graphical Passwords., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 23-35. Springer, (2015)