Author of the publication

HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites.

, , and . ICONIP (2), volume 5864 of Lecture Notes in Computer Science, page 548-555. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network., , , , , and . J. Inf. Process., (2023)Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures., , , , and . CSET, USENIX Association, (2008)DNS-Based Defense against IP Spoofing Attacks., , and . ICONIP (5), volume 7667 of Lecture Notes in Computer Science, page 599-609. Springer, (2012)Towards Automated Characterization of Malware's High-level Mechanism using Virtual Machine Introspection., , , and . ICISSP, page 471-478. SciTePress, (2019)Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 223-242. Springer, (2020)INTERCEPT+: SDN Support for Live Migration-Based Honeypots., , , and . BADGERS@RAID, page 16-24. IEEE, (2015)RTOB: A TDMA-based MAC protocol to achieve high reliability of one-hop broadcast in VANET., , and . PerCom Workshops, page 87-92. IEEE Computer Society, (2015)EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits., , , , and . BADGERS@ESORICS, page 56-65. IEEE, (2014)Local Government ICT Platform Standardization Activities of ICT Systems and Services for Offering High Value-added Service by Interacting Local Governments, Regional Institutions and Private Sector., , , , , , , and . II3E, volume 286 of IFIP Advances in Information and Communication Technology, page 315-326. Springer, (2008)Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification., , and . ICONIP (3), volume 9491 of Lecture Notes in Computer Science, page 223-232. Springer, (2015)