Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance., and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 257-271. Springer, (2013)Decision support oriented Enterprise Architecture metamodel management using classification trees., , , , and . EDOCW, page 328-335. IEEE Computer Society, (2009)Development and evaluation of information elements for simplified cyber-incident reports., , and . CyberSA, page 1-10. IEEE, (2018)The Theory of Planned Behavior and Information Security Policy Compliance., , and . J. Comput. Inf. Syst., 59 (4): 344-353 (2019)Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations., , , and . J. Univers. Comput. Sci., 18 (6): 732-749 (2012)An empirical test of the perceived relationship between risk and the constituents severity and probability., , , and . Inf. Comput. Secur., 24 (2): 194-204 (2016)Combining Defense Graphs and Enterprise Architecture Models for Security Analysis., , and . EDOC, page 349-355. IEEE Computer Society, (2008)Overview of Enterprise Information Needs in Information Security Risk Assessment., , , , and . EDOC, page 42-51. IEEE Computer Society, (2014)Estimates of Success Rates of Denial-of-Service Attacks., , and . TrustCom, page 21-28. IEEE Computer Society, (2011)A test of intrusion alert filtering based on network information., and . Secur. Commun. Networks, 8 (13): 2291-2301 (2015)