Gaurav Misra
Gaurav Misra
Data Scientist, Youtility Ltd
Zweryfikowany adres z
Cytowane przez
Cytowane przez
Information assurance techniques: Perceived cost effectiveness
JM Such, A Gouglidis, W Knowles, G Misra, A Rashid
Computers & Security 60, 117-133, 2016
How socially aware are social media privacy controls?
G Misra, JM Such
Computer 49 (3), 96-99, 2016
Pacman: Personal agent for access control in social media
G Misra, JM Such
IEEE Internet Computing 21 (6), 18-26, 2017
Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks
N Moustafa, G Misra, J Slay
IEEE Transactions on Sustainable Computing, 2018
Assurance techniques for industrial control systems (ics)
W Knowles, JM Such, A Gouglidis, G Misra, A Rashid
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
G Misra, NAG Arachchilage, S Berkovsky
International Symposium on Human Aspects of Information Security & Assurance …, 2017
All that glitters is not gold: on the effectiveness of cyber security qualifications
W Knowles, JM Such, A Gouglidis, G Misra, A Rashid
IEEE Computer 50 (12), 60-71, 2017
IMPROVE-Identifying Minimal PROfile VEctors for similarity based access control
G Misra, JM Such, H Balogun
2016 IEEE Trustcom/BigDataSE/ISPA, 868-875, 2016
Non-sharing communities? an empirical study of community detection for access control decisions
G Misra, JM Such, H Balogun
2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016
The economics of assurance activities
JM Such, A Gouglidis, W Knowles, G Misra, A Rashid
Lancaster University, 2015
REACT: REcommending Access Control decisions To social media users
G Misra, JM Such
Proceedings of the 2017 IEEE/ACM International Conference on Advances in …, 2017
Investigating login features in smartphone apps
N Micallef, E Adi, G Misra
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
A privacy assessment of social media aggregators
G Misra, JM Such, L Gill
2017 IEEE/ACM International Conference on Advances in Social Networks …, 2017
Social computing privacy and online relationships
G Misra, JM Such
Towards designing a mobile app that creates avatars for privacy protection
N Micallef, G Misra
Proceedings of the 20th International Conference on Human-Computer …, 2018
Permeance of ICT in Crime in India
G Misra
University of Twente, 2013
Poster: Using Avatars to Safeguard Privacy during Online Registrations
G Misra, N Micallef
A Cross-National Study on Cybercrime: Incident, Suspect and Victim Characteristics for Digital and Traditional Fraud in the Netherlands and Kolkata, India
G Misra, M Junger, L Montoya
Truth or Dare: Understanding and Predicting How Users Lie and Provide Untruthful Data Online
KM Ramokapane, G Misra, J Such, S Preibusch
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
A Privacy Infrastructure for Notice and Choice in the Internet of Things
N Sadeh, Y Feng, J Donnell, G Misra
Fifteenth Symposium on Usable Privacy and Security (SOUPS' 19), 2019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20