Author of the publication

Determining the Veracity of Rumours on Twitter.

, , , , , , and . SocInfo (1), volume 10046 of Lecture Notes in Computer Science, page 185-205. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The challenge of detecting sophisticated attacks: Insights from SOC Analysts., , and . ARES, page 55:1-55:9. ACM, (2018)A State Machine System for Insider Threat Detection., , , , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 111-129. Springer, (2018)Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations., , , and . J. Inf. Secur. Appl., (2022)Control Effectiveness: a Capture-the-Flag Study., , , , , and . ARES, page 87:1-87:10. ACM, (2021)Determining the Veracity of Rumours on Twitter., , , , , , and . SocInfo (1), volume 10046 of Lecture Notes in Computer Science, page 185-205. (2016)Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things., , , , and . SIoT, page 5-14. IEEE Computer Society, (2015)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CoRR, (2020)Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa., , and . ICISSP, page 75-87. SciTePress, (2019)Reviewing National Cybersecurity Awareness for Users and Executives in Africa., , and . CoRR, (2019)A Bayesian approach to insider threat detection., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 48-84 (2021)