Author of the publication

How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks.

, , , , and . Cyberpsychology Behav. Soc. Netw., 20 (2): 72-77 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks., , , , and . Cyberpsychology Behav. Soc. Netw., 20 (2): 72-77 (2017)A Cyberterrorism Effect? Emotional Reactions to Lethal Attacks on Critical Infrastructure., , , , and . Cyberpsychology Behav. Soc. Netw., 23 (9): 595-603 (2020)The CS-orona Initiative: Fulfilling the Organizational Needs of Israeli High School Computer Science Teachers during the Corona Pandemic., , and . SIGCSE, page 732-738. ACM, (2021)Sampling High Throughput Data for Anomaly Detection of Data-Base Activity., , , , , and . CoRR, (2017)Using Bandits for Effective Database Activity Monitoring., , , , and . PAKDD (2), volume 12085 of Lecture Notes in Computer Science, page 701-713. Springer, (2020)CyberRank: Knowledge Elicitation for Risk Assessment of Database Security., , , , and . CIKM, page 2009-2012. ACM, (2016)Diversifying Database Activity Monitoring with Bandits., , , , and . CoRR, (2019)A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach., , , , and . CoRR, (2020)Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection., , , , and . PADG@ESORICS, volume 11550 of Lecture Notes in Computer Science, page 82-90. Springer, (2018)