Seuraa
Duncan Hodges
Duncan Hodges
Vahvistettu sähköpostiosoite verkkotunnuksessa cranfield.ac.uk
Nimike
Viittaukset
Viittaukset
Vuosi
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
M Whitty, J Doodson, S Creese, D Hodges
Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015
1842015
A picture tells a thousand words: What Facebook and Twitter images convey about our personality
MT Whitty, J Doodson, S Creese, D Hodges
Personality and Individual Differences 133, 109-114, 2018
512018
An attenuation time series model for propagation forecasting
DD Hodges, RJ Watson, G Wyman
Antennas and Propagation, IEEE Transactions on 54 (6), 1726-1733, 2006
342006
Relationships between Password Choices, Perceptions of Risk and Security Expertise
S Creese, D Hodges, S Jamison-Powell, M Whitty
Human Aspects of Information Security, Privacy, and Trust, 80-89, 2013
332013
Personal information: Perceptions, types and evolution
RB Saglam, JRC Nurse, D Hodges
Journal of Information Security and Applications 66, 103163, 2022
282022
A model for identity in the cyber and natural universes
D Hodges, S Creese, M Goldsmith
2012 European Intelligence and Security Informatics Conference, 115-122, 2012
262012
Tools for understanding identity
S Creese, T Gibson-Robinson, M Goldsmith, D Hodges, D Kim, O Love, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
222013
What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces
L Emanuel, C Bevan, D Hodges
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 799-804, 2013
192013
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry
RB Saglam, JRC Nurse, D Hodges
International Conference on Human-Computer Interaction, 391-399, 2021
162021
Reconstructing what you said: Text Inference using Smartphone Motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
162018
Understanding cyber-attacks
D Hodges, S Creese
Cyber Warfare: A Multidisciplinary Analysis, 33, 2015
122015
An investigation into the sensitivity of personal information and implications for disclosure: A UK perspective
R Belen-Saglam, JRC Nurse, D Hodges
Frontiers in Computer Science 4, 908245, 2022
112022
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
112018
Cyber-enabled burglary of smart homes
D Hodges
Computers & Security 110, 102418, 2021
102021
Generation of attenuation time-series for EHF SATCOM simulation
D Hodges, R Watson, A Page, P Watson
IEEE Military Communications Conference, 2003. MILCOM 2003. 1, 505-510, 2003
102003
Breaking the arc: risk control for big data
D Hodges, S Creese
2013 IEEE International Conference on Big Data, 613-621, 2013
92013
Analysis of the variability in the raindrop size distribution and its effect on attenuation at 20-40 GHz
AJ Townsend, RJ Watson, DD Hodges
IEEE Antennas and Wireless Propagation Letters 8, 1210-1213, 2009
92009
Modelling and detection of rain attenuation for MF-TDMA satellite networks utilizing fade mitigation techniques
BC Grémont, RJ Watson, PA Watson, DD Hodges
COST 272 and 280 Satellite Communications–From Fade Mitigation to Service …, 2003
92003
Estimation of rainfall rate from terrestrial microwave link measurements
RJ Watson, DD Hodges
Geoscience and Remote Sensing Symposium, 2009 IEEE International, IGARSS …, 2009
82009
An analysis of conditional site diversity: A study at ka-band
DD Hodges, RJ Watson
Antennas and Propagation, IEEE Transactions on 57 (3), 721-727, 2009
82009
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20