Awareness of wireless security by home and business users

Carsten Maple , Helen Jacobs , Matthew Reeve
IADIS

2006
Enhancing usability and security in click-based visual password systems

Carsten Maple , Haider al-Khateeb , Marc Conrad
IADIS

5
2010
A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures

Thaier K.A. Hamid , Carsten Maple
Foundation of Computer Science, New York, USA

2011
From Grids to Clouds: A Collective Intelligence Study for Inter-cooperated Infrastructures

Nik Bessis , Stelios Sotiriadis , Carsten Maple , Paul Sant
IARIA

2
2010
Alignment method with application to Gas Chromatography/Mass Spectrometry screening

Carsten Maple , Malcolm Keech , Dayou Li , Jon Hitchcock
international conference on automation and computing 1 -6

2012
The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729

Peter Norrington , Carsten Maple , Paul Sant , Gregory Epiphaniou
international conference for internet technology and secured transactions 1 -6

1
2010
Feature importance in Bayesian assessment of newborn brain maturity from EEG

L. Jakaite , C. Maple , V. Schetinin
international conference on artificial intelligence 191 -195

2
2010
Comparing robustness of pairwise and multiclass neural-network systems for face recognition

L. Jakaite , C. Maple , V. Schetinin , J. Uglov
EURASIP Journal on Advances in Signal Processing 2008 ( 1) 468693

15
2008
Can a Mobile Game Teach Computer Users to Thwart Phishing Attacks

Nalin Asanka Gamagedara Arachchilage , Carsten Maple , Steve Love
arXiv: Computers and Society

2015
8
2003
Session 17: New Enabling Technologies

Mohamed Bourimi , Dogan Kesdogan , Bernd Ueberschaer , Alejandro Rodriguez-Ascaso

2010
A Theoretical Framework for Addressing Trust in Open Pervasive Networks.

Valentina Viduto , Carsten Maple , Gregory Epiphaniou
international conference on pervasive and embedded computing and communication systems 173 -178

2011
A less subjective method for evaluating cyber event threat actors

Carsten Maple , Char Sample , Bilal Hallaq , Tim Watson
Elsevier Advanced Technology

1
2016
A cross-disciplinary approach to modelling and expressing adversity

Carsten Maple , Ian Bryant , Tim Watson
ACPIL

2016
Embedding Cybersecurity in the Computer Science Curriculum

Alastair Irons , N. Savage , C. Maple , A. Davies
BCS

1
2016
Cyber security standards and issues in V2X communications

Carsten Maple , Tim Watson , Ivan Ivanov , Sang-Woo Lee

2016
What's in a name? Cultural observations on nationally named hacking groups

Jose Abdelnour-Nocera , Carsten Maple , Jonathan Bakdash , Char Sample

2017