Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process., and . UMAP (Adjunct Publication), page 203-208. ACM, (2019)Securing Mobile Healthcare Systems Based on Information Classification: DITIS Case Study., and . WOSIS, page 67-79. INSTICC Press, (2006)A Classification Platform for Security Protocols in WSNs., and . ISD, Association for Information Systems, (2017)Transparent password policies: A case study of investigating end-user situational awareness., , and . Int. J. Cyber Situational Aware., 2 (1): 85-99 (2017)Merging Policy and Practice: Crafting Effective Social Engineering Awareness-Raising Policies., , and . ICISSP, page 179-186. SCITEPRESS, (2024)The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation., and . HAISA, volume 613 of IFIP Advances in Information and Communication Technology, page 138-147. Springer, (2021)Privacy Concerns in Smart Indoor Environments in the Internet of Everything Era: A Smart University Campus Case Study., and . IoECon, volume 551 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-109. Springer, (2023)Guidelines to Develop Consumers Cyber Resilience Capabilities in the IoE Ecosystem.. IoECon, volume 458 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-28. Springer, (2022)Global perspectives on cybersecurity education for 2030: a case for a meta-discipline., , , , , , , and . ITiCSE (Companion), page 36-54. ACM, (2018)Intrusion recovery in NLOS WSNs with a varying network density., and . ICT, page 1-5. IEEE, (2017)