Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grid Authentication: A Memorability and User Sentiment Study., and . HCI (29), volume 11594 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)Supporting Privacy, Trust, and Personalization in Online Learning.. Int. J. Artif. Intell. Educ., 31 (4): 769-783 (2021)An Automated Security Concerns Recommender Based on Use Case Specification Ontology., , , and . Autom. Softw. Eng., 29 (2): 42 (2022)Phishing website detection: How effective are deep learning-based models and hyperparameter optimization?, , , and . Secur. Priv., (November 2022)Learning Programming in Social Media: An NLP-powered Reddit Study., and . TransAI, page 55-58. IEEE, (2022)API-Based Ransomware Detection Using Machine Learning-Based Threat Detection Models., , and . PST, page 1-7. IEEE, (2021)Towards Improving Privacy Control for Smart Homes: A Privacy Decision Framework., and . PST, page 1-3. IEEE Computer Society, (2018)Leveraging online social media for capturing observations of daily living and ecological momentary assessment.. IRI, page 104-108. IEEE Computer Society, (2014)Activity Detection and Analysis Using Smartphone Sensors., , , and . IRI, page 102-107. IEEE, (2018)