Filipo Sharevski
Cited by
Cited by
Mitigating active shooter impact; Analysis for policy options based on agent/computer based modeling
C Anklam, A Kirby, F Sharevski, JE Dietz
Novel approach for cybersecurity workforce development: A course in secure design
F Sharevski, A Trowbridge, J Westbrook
2018 IEEE integrated STEM education conference (ISEC), 175-180, 2018
Rules of professional responsibility in digital forensics: A comparative analysis
F Sharevski
Journal of Digital Forensics, Security and Law 10 (2), 3, 2015
Towards 5G cellular network forensics
F Sharevski
EURASIP Journal of Information Security 2918 (8), 1-8, 2018
Digital forensic investigation in cloud computing environment: impact on privacy
F Sharevski
2013 8th International Workshop on Systematic Approaches to Digital …, 2013
Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments
F Sarevski, V Rakovic, O Ognenoski, V Atanasovski, L Gavrilovska
Telfq1q12or Journal 1 (1), 10-13, 2009
User-targeted denial-of-service attacks in LTE mobile networks
R Ghannam, F Sharevski, A Chung
2018 14th International Conference on Wireless and Mobile Computing …, 2018
Enhancing quality of experience in wireless heterogeneous networks
O Ognenoski, V Rakovic, F Sarevski
17th Telecommunications forum TELFOR 2009 M. Young, The Technical Writer's …, 1989
To tweet or not to tweet: Covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions
F Sharevski, P Jachim, K Florek
arXiv preprint arXiv:2003.12093, 2020
Experiential User-Centered Security in a Classroom: Secure Design for IoT
F Sharevski, P Treebridge, J Westbrook
IEEE Communications Magazine 57 (11), 48-53, 2019
The CATS hackathon: Creating and refining test items for cybersecurity concept inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
IEEE Security & Privacy 17 (6), 77-83, 2019
Social Engineering in a Post-Phishing Era: Ambient Tactical Deception Attacks
F Sharevski, P Treebridge, P Jachim, A Li, A Babin, J Westbrook
arXiv preprint arXiv:1908.11752, 2019
Mobile Network Forensics: Emerging Research and Opportunities: Emerging Research and Opportunities
F Sharevski
IGI Global, 2018
Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering
A Trowbridge, J Westbrook, F Sharevski
arXiv preprint arXiv:1810.11063, 2018
Cyberattack surface of the next-generation mobile networks
F Sharevski
Protecting Mobile Networks and Devices: Challenges and Solutions, 1-17, 2016
Leveraging cellular intemet-of-things for resilient and robust disaster management
F Sharevski
2018 IEEE Global Communications Conference (GLOBECOM), 1-5, 2018
Malicious user experience design research for cybersecurity
A Trowbridge, F Sharevski, J Westbrook
Proceedings of the New Security Paradigms Workshop, 123-130, 2018
WikipediaBot: Automated Adversarial Manipulation of Wikipedia Articles
F Sharevski, P Jachim
arXiv preprint arXiv:2006.13990, 2020
Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse
F Sharevski, P Treebridge, P Jachim, A Li, A Babin, J Westbrook
arXiv preprint arXiv:2002.03885, 2020
Meet Malexa, Alexa's Malicious Twin: Malware-Induced Misperception Through Intelligent Voice Assistants
F Sharevski, P Treebridge, P Jachim, A Li, A Babin, J Westbrook
arXiv preprint arXiv:2002.03466, 2020
The system can't perform the operation now. Try again later.
Articles 1–20