Author of the publication

Contextual security awareness: A context-based approach for assessing the security awareness of users.

, , , , , , and . Knowl. Based Syst., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Information Security Awareness of Smartphone Users., , , and . CoRR, (2019)When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures., , and . IJCNN, page 1-8. IEEE, (2020)IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution., , , , , and . Pervasive Mob. Comput., (2019)Evaluating the Security of Open Radio Access Networks., , , , , , , and . CoRR, (2022)Taxonomy of mobile users' security awareness., , , , , and . Comput. Secur., (2018)Security of Open Radio Access Networks., , , , , , , and . Comput. Secur., (2022)A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions., , , , , and . KDD, page 2574-2583. ACM, (2021)Heuristic Approach for Countermeasure Selection Using Attack Graphs., , , , , , , , and . CSF, page 1-16. IEEE, (2021)ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment., , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 431-451. Springer, (2023)Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities., , , , , , , and . CoRR, (2020)