Author of the publication

Human Behavior Prediction for Risk Analysis.

, and . ICCSA (3), volume 12951 of Lecture Notes in Computer Science, page 288-303. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer., and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 87-110. Springer, (2020)Layout Dependent Phenomena A New Side-channel Power Model., , and . J. Comput., 7 (4): 827-837 (2012)Using the Conflicting Incentives Risk Analysis Method., and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 315-329. Springer, (2013)Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices., , and . COMPSAC (2), page 397-404. IEEE, (2019)Face Recognition Issues in a Border Control Environment., , , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 33-39. Springer, (2006)Inferring Delay Discounting Factors from Public Observables: Applications in Risk Analysis and the Design of Adaptive Incentives., and . CHIRA, page 70-80. SCITEPRESS, (2021)Mapping between Classical Risk Management and Game Theoretical Approaches., and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 147-154. Springer, (2011)A method for ranking authentication products., and . HAISA, page 80-93. University of Plymouth, (2008)Authentication in Open Systems.. PSTV, page 311-324. North-Holland, (1990)Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives.. IDMAN, volume 396 of IFIP Advances in Information and Communication Technology, page 100-103. Springer, (2013)