Author of the publication

Contextual security awareness: A context-based approach for assessing the security awareness of users.

, , , , , , and . Knowl. Based Syst., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RecSys Challenge 2015 and the YOOCHOOSE Dataset., , , , , and . RecSys, page 357-358. ACM, (2015)Content-based data leakage detection using extended fingerprinting, , and . CoRR, (2013)Using Wikipedia to Boost SVD Recommender Systems, , , and . CoRR, (2012)Online Budgeted Learning for Classifier Induction., , , and . CoRR, (2019)Evaluation of the real and perceived value of automatic and interactive query expansion, , and . SIGIR '04: Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval, page 526--527. New York, NY, USA, ACM, (2004)PRAW - A PRivAcy model for the Web., , , and . J. Assoc. Inf. Sci. Technol., 56 (2): 159-172 (2005)Highlighting items as means of adaptive assistance., , , , and . Behav. Inf. Technol., 32 (8): 761-777 (2013)Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning., , and . Inf. Sci., (2021)Using the Information Structure Model to Compare Profile-Based Information Filtering Systems., , and . Inf. Retr., 6 (1): 75-97 (2003)In-House Solution for the RecSys Challenge 2015., , , , , and . RecSys Challenge, page 10:1-10:4. ACM, (2015)