Publications

Publications
Currently viewing:
Filter by Publication Type

Page 14 of 14 Results 131 to 140 of 140

  • Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N., Mayes, K.

    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings

  • May the Force Be with You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K., Akram, R. N.

    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings

  • Caught by phishing emails? How can argumentation schemes be used to protect users?

    Thomas, R. J., Collinson, M., Masthoff, J.

    Contributions to Conferences: Papers

  • Good Vibrations: artificial ambience-based relay attack detection

    Gurulian, I., Markantonakis, K., Frank, E., Akram, R. N.

    Chapters in Books, Reports and Conference Proceedings: Conference Proceedings

  • How can persuasion reduce user cyber security vulnerabilities?

    Vargheese, J. P., Collinson, M., Masthoff, J.

    Contributions to Conferences: Papers

Show 10 | 25 | 50 | 100 results per page