Follow
Duncan Hodges
Title
Cited by
Cited by
Year
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
M Whitty, J Doodson, S Creese, D Hodges
Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015
1792015
A picture tells a thousand words: What Facebook and Twitter images convey about our personality
MT Whitty, J Doodson, S Creese, D Hodges
Personality and Individual Differences 133, 109-114, 2018
512018
An attenuation time series model for propagation forecasting
DD Hodges, RJ Watson, G Wyman
Antennas and Propagation, IEEE Transactions on 54 (6), 1726-1733, 2006
342006
Relationships between Password Choices, Perceptions of Risk and Security Expertise
S Creese, D Hodges, S Jamison-Powell, M Whitty
Human Aspects of Information Security, Privacy, and Trust, 80-89, 2013
332013
A model for identity in the cyber and natural universes
D Hodges, S Creese, M Goldsmith
2012 European Intelligence and Security Informatics Conference, 115-122, 2012
262012
Personal information: Perceptions, types and evolution
RB Saglam, JRC Nurse, D Hodges
Journal of Information Security and Applications 66, 103163, 2022
252022
Tools for understanding identity
S Creese, T Gibson-Robinson, M Goldsmith, D Hodges, D Kim, O Love, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
222013
What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces
L Emanuel, C Bevan, D Hodges
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 799-804, 2013
202013
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry
RB Saglam, JRC Nurse, D Hodges
International Conference on Human-Computer Interaction, 391-399, 2021
172021
Reconstructing what you said: Text Inference using Smartphone Motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
162018
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
112018
Understanding cyber-attacks
D Hodges, S Creese
Cyber Warfare: A Multidisciplinary Analysis, 33, 2015
112015
Cyber-enabled burglary of smart homes
D Hodges
Computers & Security 110, 102418, 2021
102021
Generation of attenuation time-series for EHF SATCOM simulation
D Hodges, R Watson, A Page, P Watson
IEEE Military Communications Conference, 2003. MILCOM 2003. 1, 505-510, 2003
102003
An investigation into the sensitivity of personal information and implications for disclosure: A UK perspective
R Belen-Saglam, JRC Nurse, D Hodges
Frontiers in Computer Science 4, 908245, 2022
92022
Breaking the arc: risk control for big data
D Hodges, S Creese
2013 IEEE International Conference on Big Data, 613-621, 2013
92013
Analysis of the variability in the raindrop size distribution and its effect on attenuation at 20-40 GHz
AJ Townsend, RJ Watson, DD Hodges
IEEE Antennas and Wireless Propagation Letters 8, 1210-1213, 2009
92009
Modelling and detection of rain attenuation for MF-TDMA satellite networks utilizing fade mitigation techniques
BC Grémont, RJ Watson, PA Watson, DD Hodges
COST 272 and 280 Satellite Communications–From Fade Mitigation to Service …, 2003
92003
Predicting Graphical Passwords
M Devlin, JRC Nurse, D Hodges, M Goldsmith, S Creese
Human Aspects of Information Security, Privacy, and Trust, 23-35, 2015
82015
Estimation of rainfall rate from terrestrial microwave link measurements
RJ Watson, DD Hodges
Geoscience and Remote Sensing Symposium, 2009 IEEE International, IGARSS …, 2009
82009
The system can't perform the operation now. Try again later.
Articles 1–20