Author of the publication

All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications.

, , , , and . Computer, 50 (12): 60-71 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assurance Techniques for Industrial Control Systems (ICS)., , , , and . CPS-SPC@CCS, page 101-112. ACM, (2015)Demo: introducing NextSharemobile, an interactive second screen application., , , , and . MobiSys, page 489-490. ACM, (2012)A survey of cyber security management in industrial control systems., , , , and . Int. J. Crit. Infrastructure Prot., (2015)Information assurance techniques: Perceived cost effectiveness., , , , and . Comput. Secur., (2016)Understanding Your Needs: An Adaptive VoD System., , and . ISM, page 255-260. IEEE Computer Society, (2012)Quality Evaluation in Peer-to-Peer IPTV Services., , , , , , , and . Data Traffic Monitoring and Analysis, volume 7754 of Lecture Notes in Computer Science, Springer, (2013)P2P-Based IPTV Services: Design, Deployment, and QoE Measurement., , , , , , and . IEEE Trans. Multim., 14 (6): 1515-1527 (2012)All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications., , , , and . Computer, 50 (12): 60-71 (2017)PCaaD: Towards Automated Determination and Exploitation of Industrial Processes., , , , , and . CoRR, (2021)Improving Interactive TV Experience Using Second Screen Mobile Applications., , , , and . ISM, page 373-376. IEEE Computer Society, (2015)