Author of the publication

Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme.

, , , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 396-413. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification., , , , and . IEEE Trans. Cybern., 50 (2): 525-535 (2020)Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection, , , and . Technologies, 8 (4): 64 (2020)A Risk Assessment Method for Smartphones., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 443-456. Springer, (2012)Towards Lightweight URL-Based Phishing Detection., , and . Future Internet, 13 (6): 154 (2021)Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT., , , , , and . CoRR, (2021)A Secure Smartphone Applications Roll-out Scheme., , , and . TrustBus, volume 6863 of Lecture Notes in Computer Science, page 49-61. Springer, (2011)Mobile Devices - A Phisher's Paradise., , , and . SECRYPT, page 79-87. SciTePress, (2014)Exploring the Adoption of Physical Security Controls in Smartphones., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 287-298. Springer, (2015)I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild., and . IEEE Access, (2018)On the Feasibility of Malware Attacks in Smartphone Platforms., , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 217-232. Springer, (2011)