Cited By
View all- Kolenbrander JHusmann EHenshaw CRheault EBoswell MMichaels A(2024)Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy ExperimentationJournal of Cybersecurity and Privacy10.3390/jcp40300264:3(546-571)Online publication date: 11-Aug-2024
- Chang KBarber S(2023)Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of ThingsEntropy10.3390/e2505071725:5(717)Online publication date: 26-Apr-2023
- John SAlbert OOkokpujie KNoma-Osaghae EOsemwegie OOkereke C(2019)Mitigating Threats in a Corporate Network with a Taintcheck-Enabled HoneypotInformation Science and Applications10.1007/978-981-15-1465-4_8(73-83)Online publication date: 19-Dec-2019