Follow
Duncan Hodges
Title
Cited by
Cited by
Year
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
M Whitty, J Doodson, S Creese, D Hodges
Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015
2002015
A picture tells a thousand words: What Facebook and Twitter images convey about our personality
MT Whitty, J Doodson, S Creese, D Hodges
Personality and Individual Differences 133, 109-114, 2018
572018
Personal information: Perceptions, types and evolution
RB Saglam, JRC Nurse, D Hodges
Journal of Information Security and Applications 66, 103163, 2022
432022
An attenuation time series model for propagation forecasting
DD Hodges, RJ Watson, G Wyman
Antennas and Propagation, IEEE Transactions on 54 (6), 1726-1733, 2006
362006
Relationships between Password Choices, Perceptions of Risk and Security Expertise
S Creese, D Hodges, S Jamison-Powell, M Whitty
Human Aspects of Information Security, Privacy, and Trust, 80-89, 2013
352013
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry
RB Saglam, JRC Nurse, D Hodges
International Conference on Human-Computer Interaction, 391-399, 2021
332021
An investigation into the sensitivity of personal information and implications for disclosure: A UK perspective
R Belen-Saglam, JRC Nurse, D Hodges
Frontiers in Computer Science 4, 908245, 2022
262022
A model for identity in the cyber and natural universes
D Hodges, S Creese, M Goldsmith
2012 European Intelligence and Security Informatics Conference, 115-122, 2012
262012
Tools for understanding identity
S Creese, T Gibson-Robinson, M Goldsmith, D Hodges, D Kim, O Love, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
222013
What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces
L Emanuel, C Bevan, D Hodges
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 799-804, 2013
202013
Reconstructing what you said: Text Inference using Smartphone Motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
172018
Cyber-enabled burglary of smart homes
D Hodges
Computers & Security 110, 102418, 2021
162021
Understanding cyber-attacks
D Hodges, S Creese
Cyber Warfare: A Multidisciplinary Analysis, 33, 2015
132015
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
112018
Breaking the arc: risk control for big data
D Hodges, S Creese
2013 IEEE International Conference on Big Data, 613-621, 2013
102013
Analysis of the variability in the raindrop size distribution and its effect on attenuation at 20-40 GHz
AJ Townsend, RJ Watson, DD Hodges
IEEE Antennas and Wireless Propagation Letters 8, 1210-1213, 2009
102009
ACD-G: Enhancing autonomous cyber defense agent generalization through graph embedded network representation
J Collyer, A Andrew, D Hodges
International Conference on Machine Learning, 2022
92022
Generation of attenuation time-series for EHF SATCOM simulation
D Hodges, R Watson, A Page, P Watson
IEEE Military Communications Conference, 2003. MILCOM 2003. 1, 505-510, 2003
92003
Modelling and detection of rain attenuation for MF-TDMA satellite networks utilizing fade mitigation techniques
BC Grémont, RJ Watson, PA Watson, DD Hodges
COST 272 and 280 Satellite Communications–From Fade Mitigation to Service …, 2003
92003
Estimation of rainfall rate from terrestrial microwave link measurements
RJ Watson, DD Hodges
Geoscience and Remote Sensing Symposium, 2009 IEEE International, IGARSS …, 2009
82009
The system can't perform the operation now. Try again later.
Articles 1–20