Cited By
View all- Spencer MColes-Kemp LHansen R(2024)Navigating the landscape of security modelling: the MORS gridJournal of Cybersecurity10.1093/cybsec/tyae02410:1Online publication date: 14-Nov-2024
- Albesher A(2023)Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 WebsitesSustainability10.3390/su15141104315:14(11043)Online publication date: 14-Jul-2023
- Fassl MPonticello ADabrowski AKrombholz K(2023)Investigating Security Folklore: A Case Study on the Tor over VPN PhenomenonProceedings of the ACM on Human-Computer Interaction10.1145/36101937:CSCW2(1-26)Online publication date: 4-Oct-2023
- Show More Cited By