Sunil Chaudhary

Orcid: 0000-0002-7138-3411

According to our database1, Sunil Chaudhary authored at least 11 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
2
1
1
1
1
3
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Feasibility of snapshot testing using wearable sensors to detect cardiorespiratory illness (COVID infection in India).
npj Digit. Medicine, 2024

Driving behaviour change with cybersecurity awareness.
Comput. Secur., 2024

2023
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises.
Comput. Sci. Rev., November, 2023

2022
Developing metrics to assess the effectiveness of cybersecurity awareness program.
J. Cybersecur., 2022

Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Building a Cybersecurity Awareness Program: Present and Prospective Aspects.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

Properties for Cybersecurity Awareness Posters' Design and Quality Assessment.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2019
Usability, security and trust in password managers: A quest for user-centric properties and features.
Comput. Sci. Rev., 2019

2016
Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance.
Proceedings of the 22nd International Conference on Virtual System & Multimedia, 2016

2015
Time Up for Phishing with Effective Anti-Phishing Research Strategies.
Int. J. Hum. Cap. Inf. Technol. Prof., 2015

Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution.
Proceedings of the Formal Methods for Industrial Critical Systems, 2015


  Loading...