Author of the publication

To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications.

, , , , and . ISSRE Workshops, page 282-287. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Natural Language Understanding for African Languages., , , , , , , and . AfricaNLP, (2023)To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications., , , , and . ISSRE Workshops, page 282-287. IEEE, (2019)FakeAP Detector: An Android-Based Client-Side Application for Detecting Wi-Fi Hotspot Spoofing., , , and . IEEE Access, (2022)A comparative study of smartphone-user security perception and preference towards redesigned security notifications., , , , and . AfriCHI, page 17:1-17:6. ACM, (2018)Artificial Intelligence-Based Smart Grid Vulnerabilities and Potential Solutions for Fake-Normal Attacks: A Short Review.. CoRR, (2022)An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents., , , , , and . IEEE Access, (2019)Investigating the Challenges Companies in Rwanda Face when Implementing Zero-Trust Network., , and . FiCloud, page 382-392. IEEE, (2023)Uncovering SMS Spam in Swahili Text Using Deep Learning Approaches., , , and . IEEE Access, (2024)A Demographic Perspective of Smartphone Security and Its Redesigned Notifications., , , and . J. Inf. Process., (2019)Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication., , , and . COMPSAC Workshops, page 261-267. IEEE Computer Society, (2015)