Sunil Chaudhary
Sunil Chaudhary
NTNU: Norwegian University of Science and Technology
Verified email at ntnu.no
Title
Cited by
Cited by
Year
The Use of Usable Security and Security Education to Fight Phishing Attacks
S Chaudhary
Tampere University Press, 2016
122016
Time up for phishing with effective anti-phishing research strategies
S Chaudhary, E Berki, L Li, J Valtanen
International Journal of Human Capital and Information Technology …, 2015
92015
A CROSS-CULTURAL AND GENDER-BASED PERSPECTIVE FOR ONLINE SECURITY: EXPLORING KNOWLEDGE, SKILLS AND ATTITUDES OF HIGHER EDUCATION STUDENTS.
S Chaudhary, Y Zhao, E Berki, J Valtanen, L Li, M Helenius, S Mystakidis
IADIS International Journal on WWW/Internet 13 (1), 2015
92015
Recognition of phishing attacks utilizing anomalies in phishing websites
S Chaudhary
72012
Challenges in Designing Usable Anti-Phishing Solutions
S Chaudhary, E Berki
Software Quality Management (SQM) XXI: Quality Comes of Age 21, 189-200, 2013
52013
Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution
S Chaudhary, L Li, E Berki, M Helenius, J Kela, M Turunen
International Workshop on Formal Methods for Industrial Critical Systems …, 2015
32015
The Need for Multi-Disciplinary Approaches and Multi-Level Knowledge for Cybersecurity Professionals
E Berki, J Valtanen, S Chaudhary, L Li
Multidisciplinary Perspectives on Human Capital and Information Technology …, 2018
22018
A Comparative Study of Cloud Services Use by Prospective IT Professionals in Five Countries
CS Kandel, E Berki, Y Zhao, S Chaudhary, M Ross, G Staples
Proc. of Software Quality Management International Conference (SQM2017), 175-187, 2017
22017
Exploring Attitudes, Knowledge and Competencies for Security Technology: A Cross-Cultural Survey in Higher Education
S Chaudhary, Y Zhao, E Berki, J Valtanen, L Li, M Helenius, S Mystakidis, ...
Proceedings of International Conference on ICT, Society and Human Beings, 11-18, 2015
22015
Increasing Social Awareness through Software Quality and Social Computing – Towards Effective Anti-Phishing Research Strategies
E Berki, S Chaudhary, L Li, J Valtanen
Software Quality Management (SQM) XXII: Software Quality in Flexible …, 2014
22014
Usability, security and trust in password managers: A quest for user-centric properties and features
S Chaudhary, T Schafeitel-Tähtinen, M Helenius, E Berki
Computer Science Review 33, 69-90, 2019
12019
A socio-cognitive and computational model for decision making and user modelling in social phishing
S Chaudhary, E Berki, L Li, J Valtanen, M Helenius
Proceedings of the 25th SQM Conference, 2017
12017
Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance
S Chaudhary, E Berki, P Nykänen, Y Zolotavkin, M Helenius, J Kela
2016 22nd International Conference on Virtual System & Multimedia (VSMM), 1-10, 2016
12016
A Comparative Study of Cloud Services Use by Prospective IT Professionals in Five Countries.
B Eleni, SK Chetan, Z Yan, C Sunil
9 th Annual International Conference on Education and New Learning …, 2017
2017
A Socio-Cognitive Model for Decision Making and User Modelling in Social Phishing
C Sunil, L Linfeng, B Eleni, V Juri, H Marko
25th Software Quality Management: Achieving Software Quality in …, 2017
2017
An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
S Chaudhary, RB Thapa, E Berki, M Helenius
Evaluation of Phishing Scenarios in Nepal and its Preparedness to Handle Them
RB Thapa, S Chaudhary
The system can't perform the operation now. Try again later.
Articles 1–17