Author of the publication

Validating an Agent-Based Model of Human Password Behavior.

, , , , and . AAAI Workshop: Artificial Intelligence for Cyber Security, volume WS-16-03 of AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Identity and Key Management for Publish-Subscribe Protocols in the Internet-of-Things., , and . IOT, page 12:1-12:7. ACM, (2019)Mismorphism: a semiotic model of computer security circumvention (poster abstract)., , , and . HotSoS, page 25:1-25:2. ACM, (2015)Evaluation of efficient security for BGP route announcements using parallel simulation., , and . Simul. Model. Pract. Theory, 12 (3-4): 187-216 (2004)The TIPPI Point: Toward Trustworthy Interfaces., and . IEEE Secur. Priv., 3 (4): 68-71 (2005)The performance impact of BGP security., , and . IEEE Netw., 19 (6): 42-48 (2005)Implementing a vertically hardened DNP3 control stack for power applications., , , , , , and . ICSS, page 45-53. ACM, (2016)Trusted virtual containers on demand., and . STC@CCS, page 63-72. ACM, (2010)Information Risk in Financial Institutions: Field Study and Research Roadmap., , , , and . FinanceCom, volume 4 of Lecture Notes in Business Information Processing, page 165-180. Springer, (2007)The Quality of Open Source Production: Zealots and Good Samaritans in the Case of Wikipedia, , and . Technical Report, TR2007-606. Department of Computer Science, Dartmouth College, Dartmouth, (September 2007)Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare., and . HealthSec, USENIX Association, (2010)