Отображение 1 - 8 результаты of 8 для поиска 'Whitty, M', время запроса: 0.03сек.
Отмена результатов
-
1
Who's Making Security Risks Online ? по Whitty, M, Creese, S, Hodges, D
Опубликовано 2013Conference item -
2
-
3
Individual differences in cyber security behaviours: An examination of who’s sharing passwords по Whitty, M, Doodson, J, Creese, S, Hodges, D
Опубликовано 2015Journal article -
4
Image Choice to Represent the Self in Different Online Environments по Whitty, M, Doodson, J, Creese, S, Hodges, D
Опубликовано 2014 -
5
Image Choice to represent the Self in Different Online Environments по Whitty, M, Doodson, J, Creese, S, Hodges, D
Опубликовано 2014Conference item -
6
Understanding insider threat: a framework for characterising attacks по Nurse, J, Buckley, O, Legg, P, Goldsmith, M, Creese, S, Wright, G, Whitty, M
Опубликовано 2014Conference item -
7
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches по Nurse, J, Legg, P, Buckley, O, Agrafiotis, I, Wright, G, Whitty, M, Upton, D, Goldsmith, M, Creese, S
Опубликовано 2014Conference item -
8
The SuperIdentity Stimulus Dataset − a Multi−Modal Biometric and Cybermetric Resource по Neil, G, Stevenage, S, Black, S, Meadows, H, Creese, S, Hodges, D, He, H, Pike, W, Love, O, Saxby, S, Knight, A, Hamlin, I, Schultz, J, Stanton−Fraser, D, Bevan, C, Emanuel, L, Whitty, M, Jamison−Powell, S
Опубликовано 2015Journal article