Filipo Sharevski
Title
Cited by
Cited by
Year
Mitigating active shooter impact; Analysis for policy options based on agent/computer based modeling
C Anklam, A Kirby, F Sharevski, JE Dietz
302014
Novel approach for cybersecurity workforce development: A course in secure design
F Sharevski, A Trowbridge, J Westbrook
2018 IEEE integrated STEM education conference (ISEC), 175-180, 2018
132018
Towards 5G cellular network forensics
F Sharevski
EURASIP Journal of Information Security 2918 (8), 1-8, 2018
82018
Rules of professional responsibility in digital forensics: A comparative analysis
F Sharevski
Journal of Digital Forensics, Security and Law 10 (2), 3, 2015
82015
Digital forensic investigation in cloud computing environment: impact on privacy
F Sharevski
2013 8th International Workshop on Systematic Approaches to Digital …, 2013
82013
Experiential user-centered security in a classroom: secure design for IoT
F Sharevski, P Treebridge, J Westbrook
IEEE Communications Magazine 57 (11), 48-53, 2019
72019
The CATS hackathon: Creating and refining test items for cybersecurity concept inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
IEEE Security & Privacy 17 (6), 77-83, 2019
62019
To tweet or not to tweet: Covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions
F Sharevski, P Jachim, K Florek
Proceedings of the 15th International Conference on Availability …, 2020
52020
User-targeted denial-of-service attacks in LTE mobile networks
R Ghannam, F Sharevski, A Chung
2018 14th International Conference on Wireless and Mobile Computing …, 2018
52018
Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments
F Sarevski, V Rakovic, O Ognenoski, V Atanasovski, L Gavrilovska
Telfq1q12or Journal 1 (1), 10-13, 2009
52009
Enhancing quality of experience in wireless heterogeneous networks
O Ognenoski, V Rakovic, F Sarevski
17th Telecommunications forum TELFOR 2009 M. Young, The Technical Writer's …, 1989
41989
Malicious user experience design research for cybersecurity
A Trowbridge, F Sharevski, J Westbrook
Proceedings of the New Security Paradigms Workshop, 123-130, 2018
32018
Meet Malexa, Alexa’s malicious twin: Malware-induced misperception through intelligent voice assistants
F Sharevski, P Jachim, P Treebridge, A Li, A Babin, C Adadevoh
International Journal of Human-Computer Studies 149, 102604, 2021
22021
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic
P Jachim, F Sharevski, P Treebridge
arXiv e-prints, arXiv: 2012.02586, 2020
22020
My Boss is Really Cool: Malware-Induced Misperception in Workplace Communication Through Covert Linguistic Manipulation of Emails
F Sharevski, P Jachim, P Treebridge, A Li, A Babin
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
22020
Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse
F Sharevski, P Treebridge, P Jachim, A Li, A Babin, J Westbrook
arXiv preprint arXiv:2002.03885, 2020
22020
Social engineering in a post-phishing era: ambient tactical deception attacks
F Sharevski, P Treebridge, P Jachim, A Li, A Babin, J Westbrook
arXiv preprint arXiv:1908.11752 10 (3368860.3368863), 2019
22019
Mobile Network Forensics: Emerging Research and Opportunities: Emerging Research and Opportunities
F Sharevski
IGI Global, 2018
22018
Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering
A Trowbridge, J Westbrook, F Sharevski
arXiv preprint arXiv:1810.11063, 2018
22018
Cyberattack surface of the next-generation mobile networks
F Sharevski
Protecting Mobile Networks and Devices: Challenges and Solutions, 1-17, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20