Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?, , , , and . EICC, page 13-18. ACM, (2023)Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN., , , , and . ACM Conference on Computer and Communications Security, page 716-726. ACM, (2014)The Many Meanings of Open Source, and . IEEE Softw., 21 (1): 34--40 (January 2004)Applying Neutralisation Theory to Better Understand Ransomware Offenders., , , and . EuroS&P Workshops, page 177-182. IEEE, (2023)TRACKSS Approach to Improving Road Safety through Sensors Collaboration on Vehicle and in Infrastructure., and . VTC Fall, page 1-5. IEEE, (2008)Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse., , , and . WPES, page 201-204. ACM, (2014)Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 203-214. Springer, (2012)On Developing Open Mobile Fault Tolerant Agent Systems., , and . SELMAS (LNCS), volume 4408 of Lecture Notes in Computer Science, page 21-40. Springer, (2006)A Roadmap for Improving the Impact of Anti-ransomware Research., , , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 137-154. Springer, (2019)Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs., , , , and . EICC, page 128-135. ACM, (2024)