The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "STAST"( http://dblp.L3S.de/Venues/STAST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/stast

Publication years (Num. hits)
2011-2012 (20) 2013-2014 (16) 2015-2016 (16) 2017-2018 (16) 2019-2020 (23) 2021-2022 (13)
Publication types (Num. hits)
inproceedings(93) proceedings(11)
Venues (Conferences, Journals, ...)
STAST(104)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 104 publication records. Showing 104 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Simon E. Parkin, Luca Viganò 0001 (eds.) Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers Search on Bibsonomy STAST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001, Theo Tryfonas (eds.) Socio-Technical Aspects in Security and Trust - 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Melvin Abraham, Michael Crabb, Sasa Radomirovic "I'm Doing the Best I Can." - Understanding Technology Literate Older Adults' Account Management Strategies. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Garfield Benjamin Who Watches the Birdwatchers? Sociotechnical Vulnerabilities in Twitter's Content Contextualisation. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Leonie Schaewitz, Cedric A. Lohmann, Konstantin Fischer, M. Angela Sasse Bringing Crypto Knowledge to School: Examining and Improving Junior High School Students' Security Assumptions About Encrypted Chat Apps. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ashwin J. Mathew Can Security Be Decentralised? - The Case of the PGP Web of Trust. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Albesë Demjaha, David J. Pym, Tristan Caulfield Found in Translation: Co-design for Security Modelling. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Katharina Schiller, Florian Adamsky Work in Progress: Can Johnny Encrypt E-Mails on Smartphones? Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ahmad Najee-Ullah, Luis Landeros, Yaroslav Balytskyi, Sang-Yoon Chang Towards Detection of AI-Generated Texts and Misinformation. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Amel Attatfa, Tony Craig Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, Sanchari Das SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001, Luca Viganò 0001 (eds.) Socio-Technical Aspects in Security and Trust - 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sandeep Gupta 0002, Matteo Camilli, Maria Papaioannou Provenance Navigator: Towards More Usable Privacy and Data Management Strategies for Smart Apps. Search on Bibsonomy STAST The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Imre Lendák, Balázs Indig, Gábor Palkó WARChain: Blockchain-Based Validation of Web Archives. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ian G. Harris, Ali Derakhshan, Marcel Carlsson A Study of Targeted Telephone Scams Involving Live Attackers. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001 Statistical Reliability of 10 Years of Cyber Security User Studies. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wojciech Jamroga, Damian Kurpiewski, Vadim Malvone Natural Strategic Abilities in Voting Protocols. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Diego Sempreboni, Luca Viganò 0001 Privacy, Security and Trust in the Internet of Neurons. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Simon Parkin, Yi Ting Chua 0001 Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Simon Butler 0002 Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Julie M. Haney, Susanne M. Furman Work in Progress: Towards Usable Updates for Smart Home Devices. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Scott Harper, Maryam Mehrnezhad, John C. Mace User Privacy Concerns and Preferences in Smart Buildings. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nelly Condori-Fernández, Franci Suni Lopez, Denisse Muñante, Maya Daneva How Can Personality Influence Perception on Security of Context-Aware Applications? Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Moritz Platt, Peter McBurney Self-Governing Public Decentralised Systems - Work in Progress. Search on Bibsonomy STAST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Tahaei, Adam D. G. Jenkins, Kami Vaniea, Maria Wolters "I Don't Know Too Much About It": On the Security Mindsets of Computer Science Students. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1George Chatzisofroniou, Panayiotis Kotzanikolaou Association Attacks in IEEE 802.11: Exploiting WiFi Usability Features. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ana Magazinius, Niklas Mellegård, Linda Olsson What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ivan Garbacz, Rosario Giustolisi, Kasper Møller Nielsen, Carsten Schuermann 0001 A Security Analysis of the Danish Deposit Return System. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Arianna Rossi, Gabriele Lenzini Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Albesë Demjaha, Simon Parkin, David J. Pym You've Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci, Paolo Santi A Privacy-Preserving Infrastructure for Driver's Reputation Aware Automotive Services. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Uchechi Phyllis Nwadike, Thomas Groß 0001 Investigating the Effect of Incidental Affect States on Privacy Behavioral Intention. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Enka Blanchard, Xavier Coquand, Ted Selker Moving to Client-Side Hashing for Online Authentication. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001 Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Julissa Milligan, Sarah Scheffler, Andrew Sellars, Trishita Tiwari, Ari Trachtenberg, Mayank Varia Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dirk van der Linden, Irit Hadar, Matthew Edwards 0001, Awais Rashid Data, Data, Everywhere: Quantifying Software Developers' Privacy Attitudes. Search on Bibsonomy STAST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Peter Carmichael, Charles Morisset, Thomas Groß 0001 SHRUBS: simulating influencing human behaviour in security. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Carmichael, Thomas Groß 0001, Charles Morisset Interventions over smart card swiping behaviour. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammed Aamir Ali, Thomas Groß 0001, Aad van Moorsel Investigation of 3-D secure's model for fraud detection. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Gabriele Lenzini, Theo Tryfonas, Debi Ashenden (eds.) STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018 Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oliver Wiese, Joscha Lausch, Jakob Bode, Volker Roth 0002 Beware the downgrading of secure electronic mail. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kalliopi Anastasopoulou, Emma J. Williams, Carolyn Whitnall, Theo Tryfonas, Elisabeth Oswald, Phillip L. Morgan, Alexandra Voinescu, Robert J. Piechocki, Andrea Tassi Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikola K. Blanchard, Ted Selker Improving voting technology is hard: the trust-legitimacy-participation loop and related problems. Search on Bibsonomy STAST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kovila P. L. Coopamootoo Work in progress: Fearful users' privacy intentions: an empirical investigation. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Mayer 0001, Melanie Volkamer Addressing misconceptions about password security effectively. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tom Fordyce, Sam Green, Thomas Groß 0001 Investigation of the effect of fear and stress on password choice. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nina Gerber, Paul Gerber, Hannah Drews, Elisa Kirchner, Noah Schlegel, Tim Schmidt, Lena Scholz FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, Amr M. Youssef Towards a comprehensive analytical framework for smart toy privacy practices. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Gabriele Lenzini (eds.) Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, Orlando, FL, USA, December 5, 2017 Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sanchari Das, Gianpaolo Russo, Andrew C. Dingman, Jayati Dev, Olivia Kenny, L. Jean Camp A qualitative study on usability and acceptability of Yubico security key. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Ehsan Toreini, Sami Alajrami Making sense of sensors: mobile sensor security awareness and education. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mahshid Mehr Nezhad, Maryam Mehrnezhad A child recognition system based on image selection patterns. Search on Bibsonomy STAST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Hemi Leibowitz Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM applications. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sunny Fugate, Jamie Lukos, Robert S. Gutzwiller, Christopher Lester Proposing ambient visualization and pre-attentive processing for threat detection. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson User trust assessment: a new approach to combat deception. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tristan Caulfield, Simon Parkin Case study: predicting the impact of a physical access control intervention. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nissy Sombatruang, M. Angela Sasse, Michelle Baddeley Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sarah M. Diesburg, C. Adam Feldhaus, Mojtaba Al Fardan, Jonathan Schlicht, Nigel Ploof Is your data gone?: measuring user perceptions of deletion. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter Carmichael, Charles Morisset, Thomas Groß 0001 Influence tokens: analysing adversarial behaviour change in coloured petri nets. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Julia Brande Earp, Jessica Staddon "I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools. Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Angeliki Kitsiou, Eleni Tzortzaki, Maria Sideri, Stefanos Gritzalis Digital privacy and social capital on social network sites. friends or foes? Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gabriele Lenzini, Giampaolo Bella, Zinaida Benenson, Carrie E. Gates (eds.) Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016, Los Angeles, CA, USA, December 5, 2016 Search on Bibsonomy STAST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jurjen Jansen, Eric Rutger Leukfeldt How People Help Fraudsters Steal Their Money: An Analysis of 600 Online Banking Fraud Cases. Search on Bibsonomy STAST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joseph Maguire 0001, Karen Renaud Alternative Authentication in the Wild. Search on Bibsonomy STAST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, Gabriele Lenzini An Analysis of Social Engineering Principles in Effective Phishing. Search on Bibsonomy STAST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan-Willem Bullee, Lorena Montoya, Wolter Pieters, Marianne Junger, Pieter H. Hartel Regression Nodes: Extending Attack Trees with Data from Social Sciences. Search on Bibsonomy STAST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Gabriele Lenzini (eds.) 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015 Search on Bibsonomy STAST The full citation details ... 2015 DBLP  BibTeX  RDF
1Simon E. Parkin, Sanket Epili A Technique for Using Employee Perception of Security to Support Usability Diagnostics. Search on Bibsonomy STAST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen What You Enter Is What You Sign: Input Integrity in an Online Banking Environment. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Debora Jeske, Lynne M. Coventry, Pamela Briggs Decision Justifications for Wireless Network Selection. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sven Uebelacker, Susanne Quiel The Social Engineering Personality Framework. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lydia Kraus, Ina Wechsung, Sebastian Möller 0001 Using Statistical Information to Communicate Android Permission Risks to Users. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Taciane Martimiano, Jean Everson Martina, Maina M. Olembo, Marcelo Carlomagno Carlos Modelling User Devices in Security Ceremonies. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Gabriele Lenzini (eds.) 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014 Search on Bibsonomy STAST The full citation details ... 2014 DBLP  BibTeX  RDF
1Jaap Boender, Marieta Georgieva Ivanova, Florian Kammüller, Giuseppe Primiero Modeling Human Behaviour with Higher Order Logic: Insider Threats. Search on Bibsonomy STAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rucha Tembe, Kyung Wha Hong, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Christopher M. Kelley American and Indian Conceptualizations of Phishing. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Milena Janic, Jan Pieter Wijbenga, Thijs Veugen Transparency Enhancing Tools (TETs): An Overview. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Melanie Volkamer, Simon Stockhardt, Steffen Bartsch, Michaela Kauer Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elmer Lastdrager, Lorena Montoya, Pieter H. Hartel, Marianne Junger Applying the Lost-Letter Technique to Assess IT Risk Behaviour. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sadia Afroz 0001, Aylin Caliskan Islam, Jordan Santell, Aaron Chapin, Rachel Greenstadt How Privacy Flaws Affect Consumer Perception. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David A. Mundie, Samuel J. Perl, Carly L. Huth Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 Third Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013, New Orleans, LA, USA, June 29, 2013 Search on Bibsonomy STAST The full citation details ... 2013 DBLP  BibTeX  RDF
1Jean Everson Martina The Ever Changing Threat Model: A Social-Technical Perspective. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Gabriele Lenzini Foreword from the Workshop Chairs - STAST 2012. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lizzie Coles-Kemp, Peter Y. A. Ryan Foreword from the Programme Chairs - STAST 2012. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson, Hossein Siadati Improved Visual Preference Authentication. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Trust Engineering via Security Protocols. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Katharine E. Worton Using Socio-Technical and Resilience Frameworks to Anticipate Threat. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alan Nochenson, C. F. Larry Heimann Optimal Security Investments in Networks of Varying Size and Topology. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 2nd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2012, Cambridge, MA, USA, June 25, 2012 Search on Bibsonomy STAST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jason R. C. Nurse, Jane E. Sinclair Towards a Model to Support the Reconciliation of Security Actions across Enterprises. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson, Hossein Siadati SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts Using Information Trustworthiness Advice in Decision Making. Search on Bibsonomy STAST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kai-Uwe Loser, Alexander Nolte, Thomas Herrmann, Haiko te Neues Information security management systems and socio-technical walkthroughs. Search on Bibsonomy STAST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1 1st Workshop on Socio-Technical Aspects in Security and Trust, STAST 2011, Milan, Italy, September 8, 2011 Search on Bibsonomy STAST The full citation details ... 2011 DBLP  BibTeX  RDF
1Philip Inglesant, Martina Angela Sasse Information security as organizational power: A framework for re-thinking security policies. Search on Bibsonomy STAST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elisa Costante, Jerry den Hartog, Milan Petkovic On-line trust perception: What really matters. Search on Bibsonomy STAST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manon van der Sar, Ingrid Mulder, Sunil Choenni Camera use in the public domain: Towards a "Big Sister" approach. Search on Bibsonomy STAST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lisa Rajbhandari, Einar Snekkenes An approach to measure effectiveness of control for risk analysis with game theory. Search on Bibsonomy STAST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 104 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license