Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why phishing still works: User strategies for combating phishing attacks., , and . Int. J. Hum. Comput. Stud., (2015)Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck., , , , and . CoRR, (2023)If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes., , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 373-388. Springer, (2022)Efficient Simulation using Shadowing Fields of Many Wireless Interferers with Correlated Shadowing., , , and . VTC Spring, page 1-5. IEEE, (2010)Comparative Analysis and Framework Evaluating Web Single Sign-On Systems., and . CoRR, (2018)Aggregate Interference Distribution From Large Wireless Networks With Correlated Shadowing: An Analytical-Numerical-Simulation Approach., , , and . IEEE Trans. Veh. Technol., 60 (6): 2752-2764 (2011)Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes., , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 534-549 (2021)A Multi-Course Report on the Experience of Unplanned Online Exams., , , , and . SIGCSE, page 17-23. ACM, (2021)Vulnerability of Open-Source Face Recognition Systems to Blackbox Attacks: A Case Study with InsightFace., , , , , and . SSCI, page 1164-1169. IEEE, (2023)Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes., , and . CoRR, (2017)