Author of the publication

Exploring the Guessability of Image Passwords Using Verbal Descriptions.

, , and . TrustCom/ISPA/IUCC, page 768-775. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart and intelligent network selection approach to support location-dependent and context-aware service migration., , , and . J. Ambient Intell. Smart Environ., 12 (3): 219-237 (2020)Evaluation of Graph Routing Single Objective Paths Using Pre-set Unequal Clustering., , and . ITNAC, page 323-328. IEEE, (2022)A New Load-Balancing Aware Objective Function for RPL's IoT Networks., , , , , and . HPCC/SmartCity/DSS, page 909-914. IEEE, (2018)Applying the Grid to 3D capture technology., , , , , and . Concurr. Comput. Pract. Exp., 19 (2): 235-249 (2007)Effect of Unequal Clustering Algorithms in WirelessHART networks., , and . MENACOMM, page 7-12. IEEE, (2021)Security-oriented view of app behaviour using textual descriptions and user-granted permission requests., , and . Comput. Secur., (2020)SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation's Systems., and . J. Artif. Soc. Soc. Simul., (2013)Enhancing Graph Routing Algorithm of Industrial Wireless Sensor Networks Using the Covariance-Matrix Adaptation Evolution Strategy., , and . Sensors, 22 (19): 7462 (2022)Towards using unstructured user input request for malware detection., , and . Comput. Secur., (2020)Permission-based Risk Signals for App Behaviour Characterization in Android Apps., , and . ICISSP, page 183-192. SciTePress, (2019)