From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Framework of Measuring the Business Values of Software., , , , , и . HCI (1), том 4550 из Lecture Notes in Computer Science, стр. 559-568. Springer, (2007)Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior., , , , и . CIC, стр. 306-313. IEEE, (2019)Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication., , , , и . HICSS, стр. 1-10. ScholarSpace, (2021)Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption., , и . Financial Cryptography (2), том 12675 из Lecture Notes in Computer Science, стр. 406-413. Springer, (2021)Transient self-heating modeling and simulations of back-end-of-line interconnects., , и . IRPS, стр. 2-1. IEEE, (2018)Elapsed-time statistics of successive breakdown in the presence of variability for dielectric breakdown in BEOL/MOL/FEOL applications., , , и . IRPS, стр. 3. IEEE, (2018)Cooperation and Codenames: Understanding Natural Language Processing via Codenames., , , и . AIIDE, стр. 160-166. AAAI Press, (2019)Study on the Optoelectronic Behavior of Zr Based MOFs Using Computational Simulations., , , и . CCWC, стр. 630-633. IEEE, (2019)MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies., , , и . HICSS, стр. 1-10. ScholarSpace, (2020)Myolink: EMG-based Inter-human Wireless Neuroprosthetic Controller., , , , , и . CSCI, стр. 1140-1145. IEEE, (2021)