Author of the publication

Does context influence responses to firewall warnings?

, , and . eCrime Researchers Summit, page 1-10. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks., and . CoRR, (2020)Towards power profiling of Android permissions., , and . NTMS, page 1-5. IEEE, (2015)One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN., , and . INFOCOM Workshops, page 408-413. IEEE, (2017)The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey., , , and . CoRR, (2019)A New Perspective on Providing Cloud Computing Security - A Position Paper., , , , and . CLOSER, page 650-655. SciTePress, (2011)A Discussion on Security Education in Academia., , , , , and . ACM Conference on Computer and Communications Security, page 2187-2188. ACM, (2018)Optimal Slice Allocation in 5G Core Networks., and . CoRR, (2018)Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 104-121. (2005)Improved SDN responsiveness to UDP flood attacks., , and . CNS, page 715-716. IEEE, (2015)IoT Trust Establishment Through System Level Interactions and Communication Attributes., , , and . GLOBECOM, page 5919-5924. IEEE, (2023)