Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the Use of Belief-Bias to Measure Acceptance of False Information., and . SBP-BRiMS, volume 14161 of Lecture Notes in Computer Science, page 149-158. Springer, (2023)Health Information Seeking Behaviour, Risk Communication, and Mobility During COVID-19., and . ISTAS, page 283-289. IEEE, (2020)"We will Reduce Taxes" - Identifying Election Pledges with Language Models., , , , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 3406-3419. Association for Computational Linguistics, (2021)Extending the Influence of Contextual Information in ACT-R using Buffer Decay., , and . CogSci, cognitivesciencesociety.org, (2014)Sub-Categorical Properties of Stimuli Determine the Category-Order Effect., and . CogSci, cognitivesciencesociety.org, (2016)An Account of Associative Learning in Memory Recall., , , and . CogSci, cognitivesciencesociety.org, (2015)Insider Threat Detection: A Solution in Search of a Problem., and . Cyber Security, page 1-7. IEEE, (2020)Beyond the Prisoner's Dilemma: the Social Dilemmas of Cybersecurity., and . CyberSA, page 1-7. IEEE, (2020)Preface., , , and . Comput. Math. Organ. Theory, 25 (1): 1-3 (2019)The Cybersecurity (CSEC) Questionnaire: Individual Differences in Unintentional Insider Threat Behaviours., and . CyberSA, page 1-8. IEEE, (2021)