Author of the publication

Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks.

, , and . CHI Extended Abstracts, page 288:1-288:15. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit., , , and . Inform. Spektrum, 42 (1): 38-47 (2019)Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing., , , and . CyberICPS/SECPRE@ESORICS, volume 11387 of Lecture Notes in Computer Science, page 137-152. Springer, (2018)Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing., , , and . CoRR, (2019)Specifying IT Security Awareness., and . DEXA Workshops, page 326-330. IEEE Computer Society, (2014)Tampering with Motes: Real-World Attacks on Wireless Sensor Networks., , and . Sicherheit, volume P-77 of LNI, page 26-29. GI, (2006)Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte., , and . Sicherheit, volume P-195 of LNI, page 7-24. GI, (2012)Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks., , and . CHI Extended Abstracts, page 288:1-288:15. ACM, (2023)User Authentication in Sensor Networks., , and . GI Jahrestagung (2), volume P-51 of LNI, page 385-389. GI, (2004)Secure Multi-Party Computation with Security Modules., , and . Sicherheit, volume P-62 of LNI, page 41-52. GI, (2005)Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten., , , and . Sicherheit, volume P-228 of LNI, page 37-51. GI, (2014)