Your selections:
- Lines, Lauren Elizabeth, Kakyo, Tracy Alexis, Grant, Julian Maree, Hutton, Alison
- Farrell, Michael, Shahbazi, Jeyran, Nielsen, Suzanne, Dunlop, Adrian, Dore, Gregory J., McDonough, Michael, Montebello, Mark, Weiss, Rob, Rodgers, Craig, Cook, Jon, Degenhardt, Louisa, Chambers, Mark, Byrne, Marianne, Gholami, Jaleh, Zahra, Emma, Grebely, Jason, Lintzeris, Nicholas, Larance, Briony, Ali, Robert
- Li, Yu, Ye, Xinyu, Zhang, Sheng, Wang, Shanyong
- Newaz, Mohammad Tanvi, Ershadi, Mahmoud, Jefferies, Marcus, Davis, Peter
- Zeng, Taoran, Ng, Johan Y. Y., Lubans, David R., Lonsdale, Chris, Ng, Florrie F., Ha, Amy S.
- Zhang, Zikai, Chica, Manuel, Tang, Qiuhua, Li, Ziziang, Zhang, Liping
- Moghtaderi, Behdad, Seyfaee, Adrian
- Warren, Jessica M., Hanstock, Tanya L., Hunt, Sally A., Halpin, Sean A., Warner-Metzger, Christina M., Gurwitch, Robin H.
A novel machine learning approach for detecting first-time-appeared malware
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay
- Saul, A., Taylor, B. V., Lechner-Scott, J., van der Mei, I., Blizzard, L., Simpson-Yap, S., Oddy, W. H., Shivappa, N., Hebert, J. R., Black, L. J., Ponsonby, A. L., Broadley, S. A.
- Obayomi, Kehinde Shola, Lau, Sie Yon, Danquah, Michael K., Zhang, Jianhua, Chiong, Tung, Obayomi, Oluwatobi Victoria, Meunier, Louise, Rahman, Mohammad Mahmudur
- Collet, Carlos, Yong, Andy, Ford, Tom, Gori, Tommaso, Koo, Bon-Kwon, Low, Adrian F., Miner, Steve, Ng, Martin K. C., Mizukami, Takuya, Shimokawa, Hiroki, Smilowitz, Nathaniel R., Sutton, Nadia R., Munhoz, Daniel, Svanerud, J, Tremmel, JA, Warisawa, T, West, NEJ, Ali, ZA, Akasaka, Takashi, Berry, Colin, Blair, John E. A., Collison, Damien, Engstrøm, Thomas, Escaned, Javier, Fearon, William F.
- Umeh, Anthony C., Naidu, Ravi, Olisa, Emmanuel, Liu, Yanju, Qi, Fangjie, Bekele, Dawit
- Erdiaw-Kwasie, Michael Odei, Abunyewah, Matthew, Baah, Charles
- Skinner, Janelle A., Leary, Mark, Wood, Lisa G., Colyvas, Kim, Collins, Clare E., Burrows, Tracy L., Whatnall, Megan, Collins, Rebecca A., Pursey, Kirrilly M., Verdejo-Garcia, Antonio, Hay, Philipa J., Baker, Amanda L., Hides, Leanne, Paxton, Susan J.
A typology of cybersecurity behavior among knowledge workers
- Baltuttis, Dennik, Teubner, Timm, Adam, Marc T. P.
- Das, Avijit, Lamichhane, Bishnu P., Nataraj, Neela
- Whitton, Clare, Collins, Clare E., Kirkpatrick, Sharon I., Pollard, Christina M., Healy, Janelle D., Hassan, Amira, Garg, Shivangi, Atyeo, Paul, Mukhtar, Syed Aqif, Kerr, Deborah A., Mullan, Barbara A., Rollo, Megan E., Dhaliwal, Satvinder S., Norman, Richard, Boushey, Carol J., Delp, Edward J., Zhu, Fengqing, McCaffrey, Tracy A.
- Huang, Dan, Zhang, Li, Oliver, Brian G., Xie, Min, Qin, Ling, Liu, Dan, Wan, Huajing, Luo, Fengming, Li, Weimin, Wang, Gang, Gibson, Peter G., Liu, Ying, Wang, Ji, Zhang, Jie, Baines, Katherine J., Liu, Gang, Hsu, Alan Chen-Yu, Wang, Fang, Chen, Zhihong
Adaptive payoff-driven interaction in networked snowdrift games
- Xiong, Xiaojin, Yao, Yichao, Feng, Minyu, Chica, Manuel
Are you sure you would like to clear your session, including search history and login status?