Author:
Raja Fahimeh,Hawkey Kirstie,Jaferian Pooya,Beznosov Konstantin,Booth Kellogg S.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementation method of non-bypassable PC application firewalls using virtualization technologies;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
2. Forensic experts' view of forensic‐ready software systems: A qualitative study;Journal of Software: Evolution and Process;2023-07-12
3. The boundedly rational employee: Security economics for behaviour intervention support in organizations1;Journal of Computer Security;2022-07-04
4. You’ve Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations;Lecture Notes in Computer Science;2021
5. Using Context and Provenance to defend against USB-borne attacks;Proceedings of the 14th International Conference on Availability, Reliability and Security;2019-08-26