-
1Report
المؤلفون: Sombatruang, N, Caulfield, T, Becker, I, Fujita, A, Kasama, T, Nakao, K, Inoue, D
المصدر: In: Proceedings of USENIX Security '23. USENIX Association: Anaheim, CA, USA. (2023) (In press).
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10156841/1/sombatruang_internet_2023.pdf; https://discovery.ucl.ac.uk/id/eprint/10156841/
-
2Book
المؤلفون: Johnson, S, Ekblom, P, Laycock, G, Frith, M, Sombatruang, N, Rosas Valdez, E
المساهمون: Wortley, R, Sidebottom, A, Tilley, N, Laycock, G
المصدر: In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.) Routledge Handbook of Crime Science. Routledge: Abingdon, UK. (2018)
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10086157/3/Frith_FutureCrimeJohnsonetal1July2018.pdf; https://discovery.ucl.ac.uk/id/eprint/10086157/
-
3Academic Journal
المؤلفون: Blythe, JM, Sombatruang, N, Johnson, SD
المصدر: Journal of Cybersecurity , 5 (1) , Article tyz005. (2019)
مصطلحات موضوعية: Internet of Things, IoT security, consumer IoT
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10079499/1/What%20security%20features%20and%20crime%20prevention%20advice%20is%20communicated%20in%20consumer%20IoT%20device%20manuals%20and%20support%20pages.pdf; https://discovery.ucl.ac.uk/id/eprint/10079499/
-
4Report
المؤلفون: Sombatruang, N, Onwuzurike, L, Sasse, MA, Baddeley, M
المصدر: In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. (pp. pp. 203-214). ACM: New York (NY), USA. (2019)
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10078269/1/My_WiFi_Choices___WISEC_FINAL.pdf; https://discovery.ucl.ac.uk/id/eprint/10078269/
-
5Report
المؤلفون: Sombatruang, N, Kadobayashi, Y, Sasse, MA, Baddeley, M, Miyamoto, D
المصدر: In: 2018 16th Annual Conference on Privacy, Security and Trust (PST) proceedings. IEEE: Belfast, UK. (2018)
مصطلحات موضوعية: Public Wi-Fi Security, Human-Centered Security, Users Decision-Making, Resource Preservation Heuristic
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10074787/1/Wi_Fi_Japan_CFP_Final_accepted_names.pdf; https://discovery.ucl.ac.uk/id/eprint/10074787/
-
6Conference
المؤلفون: Sombatruang, N, Omiya, T, Miyamoto, D, Sasse, MA, Kadobayashi, Y, Baddeley, M
مصطلحات موضوعية: Artificial Intelligence & Image Processing
وصف الملف: application/pdf
Relation: Information and Communications Security; International Conference on Information and Communications Security; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Information and Communications Security, 2020, 12282 LNCS, pp. 223-242; http://hdl.handle.net/10453/147793
الاتاحة: http://hdl.handle.net/10453/147793
-
7ReportWhy do people use unsecure public Wi-Fi? An investigation of behaviour and factors driving decisions
المؤلفون: Sombatruang, N, Sasse, MA, Baddeley, M
المصدر: In: (Proceedings) STAST '16 Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust. (pp. pp. 61-72). Association for Computing Machinery (2016)
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10040049/1/p61-sombatruang.pdf; https://discovery.ucl.ac.uk/id/eprint/10040049/
الاتاحة: https://discovery.ucl.ac.uk/id/eprint/10040049/1/p61-sombatruang.pdf
https://discovery.ucl.ac.uk/id/eprint/10040049/ -
8Electronic Resource
المؤلفون: Sombatruang, N, Omiya, T, Miyamoto, D, Sasse, MA, Kadobayashi, Y, Baddeley, M
مصطلحات الفهرس: Conference Proceeding
URL:
http://hdl.handle.net/10453/147793
Information and Communications Security
International Conference on Information and Communications Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
10.1007/978-3-030-61078-4_13 -
9
المؤلفون: M. Angela Sasse, Michelle Baddeley, Nissy Sombatruang
المساهمون: 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016 Los Angeles, US 5 December 2016, Sombatruang, N, Sasse, MA, Baddeley, M
المصدر: STAST
مصطلحات موضوعية: Risk awareness, Risk behaviour, business.industry, 05 social sciences, Internet privacy, public wi-fi security, data leakage, 0502 economics and business, Sexual orientation, people and security, 0501 psychology and cognitive sciences, Instant messaging, 050207 economics, Date of birth, business, Set (psychology), 050107 human factors, Expected utility hypothesis, Behavioural economics