Author of the publication

A comparative study of smartphone-user security perception and preference towards redesigned security notifications.

, , , , and . AfriCHI, page 17:1-17:6. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Game Theoretic Solutions for Cloud Computing Security Issues., , , and . InterSol, volume 296 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2019)Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage., , , , , , and . CCGRID, page 440-449. IEEE, (2020)Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing., , , and . J. Inf. Process., 24 (2): 371-380 (2016)An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents., , , , , and . IEEE Access, (2019)IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition., , and . Koli Calling, page 16:1-16:10. ACM, (2019)Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency., , , , and . EDGE, volume 10973 of Lecture Notes in Computer Science, page 3-17. Springer, (2018)Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics., , , , and . CSR, page 241-248. IEEE, (2021)SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches., , , and . ICCCS, page 491-497. IEEE, (2020)Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss., , , , and . ICAIIC, page 42-47. IEEE, (2021)Supportive Information to Find Victims from Aerial Video in Search and Rescue Operation., , , and . IoTaIS, page 56-61. IEEE, (2019)