Cited By
View all- Dwight J(2024)Building Cyber Attack Trees with the Help of My LLM? A Mixed Method StudyProceedings of the 2024 12th International Conference on Computer and Communications Management10.1145/3688268.3688288(132-138)Online publication date: 19-Jul-2024
- Ramokapane KSameen MDkaidek Z(2024)Inclusive Internet of Things Privacy LabelsIEEE Security and Privacy10.1109/MSEC.2024.341781922:5(32-39)Online publication date: 1-Sep-2024
- Sharevski F(2024)Inclusive Involvement of At-Risk Users in Cybersecurity ResearchIEEE Security and Privacy10.1109/MSEC.2024.341687822:5(13-22)Online publication date: 1-Sep-2024
- Show More Cited By