Author of the publication

Visualising network events in a muggle friendly way

, , , , , , and . Centre for Multidisciplinary Research, Innovation and Collaboration, IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A tool for security metrics modeling and visualization, , , and . Proceedings of the 2014 European Conference on Software Architecture Workshops, page 3. ACM, (2014)A tool for security metrics modeling and visualization., , , and . ECSA Workshops, page 3:1-3:7. ACM, (2014)Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC., , , and . SECRYPT, page 659-664. SCITEPRESS, (2021)Proof-of-Concept for a Granular Incident Management Information Sharing Scheme., , , , , , and . AIIoT, page 515-520. IEEE, (2022)Visualizing network events in a muggle friendly way., , , , , , and . CyberSA, page 1-4. IEEE, (2017)Review of the use of human senses and capabilities in cryptography., and . Comput. Sci. Rev., (2021)Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC., , , , , and . HCSE, volume 13482 of Lecture Notes in Computer Science, page 70-89. Springer, (2022)CryptoVault - A Secure Hardware Wallet for Decentralized Key Management., , , , and . COINS, page 1-4. IEEE, (2021)Security Risk Visualization with Semantic Risk Model., , , , and . ANT/SEIT, volume 83 of Procedia Computer Science, page 1194-1199. Elsevier, (2016)Light Quantum Key Distribution Network Security Estimation Tool., , , and . SECRYPT, page 587-596. SCITEPRESS, (2023)