Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient policing for screen mirroring traffic., , , , , and . Hum. centric Comput. Inf. Sci., (2018)ESA: a CLIM library for writing Emacs-Style Applications., , , and . ILC, page 24. ACM, (2007)The state of enterprise network traffic in 2012., and . APCC, page 179-184. IEEE, (2012)A systematic approach to investigating how information security and privacy can be achieved in BYOD environments., , and . Inf. Comput. Secur., 25 (4): 475-492 (2017)Precomputed Ionospheric Propagation for HF Wireless Sensor Transmission Scheduling., , and . MASCOTS, page 1-8. IEEE, (2021)Usability Perceptions of Culturally Adapted Web Pages., , , and . ACIS, page 25. (2021)The interaction of dark traits with the perceptions of apprehension., , , , , , and . HICSS, page 1-10. ScholarSpace, (2022)Economic Incentives and Perceptions as Critical Factors for Understanding Insider Hacking Behavior., , , , , , and . HICSS, page 3223-3232. ScholarSpace, (2024)Transferability of Neural Network Approaches for Low-rate Energy Disaggregation., , , , and . ICASSP, page 8330-8334. IEEE, (2019)An Analysis of Handoff in Multi-band 802.11 Networks., , and . MASS, page 1-10. IEEE Computer Society, (2007)