Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of conditional entropy measures to steganalysis., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607204. SPIE, (2006)A government perspective on digital data embedding: taking a systems approach.. MM&Sec, page 77-78. ACM, (2005)Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures., and . WEIS, (2015)When the Winning Move is Not to Play: Games of Deterrence in Cyber Security., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 250-269. Springer, (2015)Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach., , , , , and . CSCloud, page 382-389. IEEE Computer Society, (2015)Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements., and . ARES, page 572-581. IEEE Computer Society, (2016)A case for the economics of secure software development., and . NSPW, page 92-105. ACM, (2016)Characterization of steganographic algorithms using software metrics.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 264-274. SPIE, (2005)Motivating Security Engineering with Economics: A Utility Function Approach., , and . QRS Companion, page 352-359. IEEE, (2016)Software Security Investment: The Right Amount of a Good Thing., and . SecDev, page 53-59. IEEE Computer Society, (2016)