Login / Signup
Sunil Chaudhary
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 10
Top Topics
Video Surveillance
Behave Differently
Security Requirements
Small And Medium Sized Enterprises
Top Venues
Comput. Sci. Rev.
VSMM
ARES
Comput. Secur.
</>
Publications
</>
Sunil Chaudhary
Driving behaviour change with cybersecurity awareness.
Comput. Secur.
142 (2024)
Sunil Chaudhary
,
Vasileios Gkioulos
,
Sokratis K. Katsikas
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises.
Comput. Sci. Rev.
50 (2023)
Sunil Chaudhary
,
Marko Kompara
,
Sebastian Pape
,
Vasileios Gkioulos
Properties for Cybersecurity Awareness Posters' Design and Quality Assessment.
ARES
(2022)
Sunil Chaudhary
,
Vasileios Gkioulos
Building a Cybersecurity Awareness Program: Present and Prospective Aspects.
CyberSec4Europe
(2022)
Sunil Chaudhary
,
Vasileios Gkioulos
,
Sokratis K. Katsikas
Developing metrics to assess the effectiveness of cybersecurity awareness program.
J. Cybersecur.
8 (1) (2022)
Sunil Chaudhary
,
Vasileios Gkioulos
,
David Goodman
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources.
CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS
(2022)
Sunil Chaudhary
,
Tiina Schafeitel-Tähtinen
,
Marko Helenius
,
Eleni Berki
Usability, security and trust in password managers: A quest for user-centric properties and features.
Comput. Sci. Rev.
33 (2019)
Sunil Chaudhary
,
Eleni Berki
,
Pirkko Nykänen
,
Yevhen Zolotavkin
,
Marko Helenius
,
Juha Kela
Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance.
VSMM
(2016)
Sunil Chaudhary
,
Eleni Berki
,
Linfeng Li
,
Juri Valtanen
Time Up for Phishing with Effective Anti-Phishing Research Strategies.
Int. J. Hum. Cap. Inf. Technol. Prof.
6 (2) (2015)
Sunil Chaudhary
,
Linfeng Li
,
Eleni Berki
,
Marko Helenius
,
Juha Kela
,
Markku Turunen
Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution.
FMICS
(2015)