From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Test of Structured Threat Descriptions for Information Security Risk Assessments., , и . ICISSP, стр. 469-476. SciTePress, (2018)An empirical test of the perceived relationship between risk and the constituents severity and probability., , , и . Inf. Comput. Secur., 24 (2): 194-204 (2016)A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour., , и . Int. J. Inf. Secur. Priv., 9 (1): 26-46 (2015)Live Enrolment for Identity Documents in Europe., , , и . EGOV, том 11020 из Lecture Notes in Computer Science, стр. 29-39. Springer, (2018)Skade - A Challenge Management System for Cyber Threat Hunting., , , и . ESORICS Workshops (1), том 14398 из Lecture Notes in Computer Science, стр. 84-103. Springer, (2023)Assessing Information Security Risks using Pairwise Weighting., , и . ICISSP, стр. 318-324. SciTePress, (2017)Perceived Information Security Risk as a Function of Probability and Severity., , , и . HAISA, стр. 183-193. University of Plymouth, (2015)A meta-analysis of field experiments on phishing susceptibility., и . eCrime, стр. 1-14. IEEE, (2019)Automatic incident response solutions: a review of proposed solutions' input and output., и . ARES, стр. 37:1-37:9. ACM, (2023)