Author of the publication

Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations.

, , , and . ICISSP, page 643-651. SCITEPRESS, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android Feature Selection based on Permissions, Intents, and API Calls., , , and . SERA, page 149-154. IEEE, (2022)Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations., , , and . ICISSP, page 643-651. SCITEPRESS, (2024)Speed-Area Optimized VLSI Architecture of Hexagonal Search Algorithm for Motion Estimation of (512×512) Frames., , , , , and . CSSP, 36 (2): 640-657 (2017)Self-Stablizing Fault Location., and . ICCI, page 103-107. IEEE Computer Society, (1993)State-optimal snap-stabilizing PIF in tree networks., , , and . WSS, page 78-85. IEEE Computer Society, (1999)Stabilizing mobile philosophers., , and . Inf. Process. Lett., 95 (1): 299-306 (2005)A fast auto white balance scheme for digital pathology., , , , and . BHI, page 153-156. IEEE, (2014)Self-Stabilizing Multi-Token Rings., , and . Distributed Comput., 8 (3): 133-142 (1995)Methods and System for Segmentation of Isolated Nuclei in Microscopic Breast Fine Needle Aspiration Cytology Images., , , , , , and . ICVGIP Workshops, volume 10481 of Lecture Notes in Computer Science, page 380-392. Springer, (2016)A Self-stabilizing Token-Based k-out-of-l Exclusion Algorithm., , and . Euro-Par, volume 2400 of Lecture Notes in Computer Science, page 553-562. Springer, (2002)