Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A grounded analysis of experts' decision-making during security assessments., , , and . J. Cybersecur., 2 (2): 147-163 (2016)Privacy Risk in Cybersecurity Data Sharing., , , , and . WISCS@CCS, page 57-64. ACM, (2016)A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements., , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3579-3591 (2022)Ask the Experts: What Should Be on an IoT Privacy and Security Label?, , , and . SP, page 447-464. IEEE, (2020)Observations From an Online Security Competition and Its Implications on Crowdsourced Security., , , and . CoRR, (2022)Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy., , , and . CNS, page 74-82. IEEE, (2021)Usability of Forensics Tools: A User Study., , and . IMF, page 81-91. IEEE Computer Society, (2011)Composite Security Requirements in the Presence of Uncertainty.. Carnegie Mellon University, USA, (2018)Towards a framework to measure security expertise in requirements analysis., , , and . ESPRE, page 13-18. IEEE Computer Society, (2014)Less is more?: investigating the role of examples in security studies using analogical transfer., , , , and . HotSoS, page 7. ACM, (2014)