Author of the publication

EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits.

, , , , and . BADGERS@ESORICS, page 56-65. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Government ICT Platform Standardization Activities of ICT Systems and Services for Offering High Value-added Service by Interacting Local Governments, Regional Institutions and Private Sector., , , , , , , and . II3E, volume 286 of IFIP Advances in Information and Communication Technology, page 315-326. Springer, (2008)EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits., , , , and . BADGERS@ESORICS, page 56-65. IEEE, (2014)PhishCage: reproduction of fraudulent websites in the emulated internet., , , and . SimuTools, page 242-247. ICST/ACM, (2013)New LDoS Attack in Zigbee Network and its Possible Countermeasures., , , and . SMARTCOMP, page 246-251. IEEE, (2021)Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification., , and . ICONIP (3), volume 9491 of Lecture Notes in Computer Science, page 223-232. Springer, (2015)An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation., , , and . ISCC, page 378-385. IEEE Computer Society, (2006)An Independent Evaluation of Web Timing Attack and its Countermeasure., , , and . ARES, page 1319-1324. IEEE Computer Society, (2008)Neural Circuit Simulation of Hodgkin-Huxley Type Neurons Toward Peta Scale Computers., , and . SC Companion, page 1541. IEEE Computer Society, (2012)Task and Instance Quadratic Ordering for Active Online Multitask Learning., , , , and . ICONIP (3), volume 11303 of Lecture Notes in Computer Science, page 435-447. Springer, (2018)A comparative study of smartphone-user security perception and preference towards redesigned security notifications., , , , and . AfriCHI, page 17:1-17:6. ACM, (2018)