Personensuche
X
?
Proceedings of the CHI Conference on Human Factors in Computing Systems ,
1
Comparing the Use and Usefulness of Four IoT Security Label:
, In:
?
2023 IEEE International Symposium on Technology and Society (ISTAS) ,
2
Discourse, Challenges, and Prospects Around the Adoption an..:
, In:
?
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
3
An Argument for Linguistic Expertise in Cyberthreat Analysi..:
, In:
?
2022 APWG Symposium on Electronic Crime Research (eCrime) ,
4
Building and Testing a Network of Social Trust in an Underg..:
, In:
?
Proceedings of the 2022 European Symposium on Usable Security ,
6
Privacy Lessons Learnt from Deploying an IoT Ecosystem in t..:
, In:
?
The Fifth International Conference on Safety and Security with IoT; EAI/Springer Innovations in Communication and Computing ,
7
On the Analysis of MUD-Files' Interactions, Conflicts, and ..:
, In:
?
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) ,
8
Integrating Human Intelligence to Bypass Information Asymme..:
, In:
?
Human Aspects of Information Security and Assurance; IFIP Advances in Information and Communication Technology ,
10
Making Access Control Easy in IoT:
, In:
?
Annual Computer Security Applications Conference ,
11
Is Visualization Enough? Evaluating the Efficacy of MUD-Vis..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
15