Author of the publication

Using Active Probes to Detect Insiders Before They Steal Data.

, , , and . AMCIS, Association for Information Systems, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical evaluation of wavelets based viz-a-viz classical state-of-art to image denoising., and . IC3, page 331-336. IEEE, (2013)Special Issue on Connected Vehicles Guest Editorial.. IEEE Intell. Transport. Syst. Mag., 8 (3): 5-7 (2016)Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours., , , and . ECIS, page 25. (2018)Is Privacy Really a Paradox? Laying the Groundwork to Study the Gap between Privacy Valuation and Behavior., , , and . AMCIS, Association for Information Systems, (2020)Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches., and . Complex., 9 (2): 54-73 (2003)Metrics for characterizing the form of security policies., and . J. Strateg. Inf. Syst., 19 (4): 281-295 (2010)Guest Editors' Introduction., , , and . Inf. Syst. Frontiers, 7 (2): 111-112 (2005)Investigating syntactic and semantic inconsistencies in Collaborative Software Development., and . IC3, page 509-515. IEEE Computer Society, (2015)Software Engineering Approach for Teaching Development of Scalable Enterprise Applications., and . CSEE&T, page 105-112. IEEE Computer Society, (2009)PoGest: A vision based tool for facilitating Kathak learning., and . IC3, page 24-29. IEEE Computer Society, (2014)