default search action
Shane D. Johnson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i7]Felix Soldner, Fabian Plum, Bennett Kleinberg, Shane D. Johnson:
From cryptomarkets to the surface web: Scouting eBay for counterfeits. CoRR abs/2406.05021 (2024) - 2023
- [j4]Sergi D. Bray, Shane D. Johnson, Bennett Kleinberg:
Testing human ability to detect 'deepfake' images of human faces. J. Cybersecur. 9(1) (2023) - 2022
- [i6]Felix Soldner, Bennett Kleinberg, Shane D. Johnson:
Counterfeits on Darknet Markets: A measurement between Jan-2014 and Sep-2015. CoRR abs/2212.02945 (2022) - [i5]Sergi D. Bray, Shane D. Johnson, Bennett Kleinberg:
Testing Human Ability To Detect Deepfake Images of Human Faces. CoRR abs/2212.05056 (2022) - 2021
- [i4]Dario Ortega Anderez, Eiman Kanjo, Amna Anwar, Shane D. Johnson, David Lucy:
The Rise of Technology in Crime Prevention: Opportunities, Challenges and Practitioners Perspectives. CoRR abs/2102.04204 (2021) - [i3]Felix Soldner, Bennett Kleinberg, Shane D. Johnson:
Confounds and Overestimations in Fake Review Detection: Experimentally Controlling for Product-Ownership and Data-Origin. CoRR abs/2110.15130 (2021) - 2020
- [j3]Dario Ortega Anderez, Eiman Kanjo, Ganna Pogrebna, Omprakash Kaiwartya, Shane D. Johnson, John Alan Hunt:
A COVID-19-Based Modified Epidemiological Model and Technological Approaches to Help Vulnerable Individuals Emerge from the Lockdown in the UK. Sensors 20(17): 4967 (2020) - [c3]Zahra Jafari, Toby Davies, Shane D. Johnson:
Spatial analysis of border closure intervention scheme in conflict-induced displacement. GeoSim@SIGSPATIAL 2020: 1-9 - [c2]Matt Wixey, Emiliano De Cristofaro, Shane D. Johnson:
On the Feasibility of Acoustic Attacks Using Commodity Smart Devices. SP (Workshops) 2020: 88-97 - [i2]Matt Wixey, Shane D. Johnson, Emiliano De Cristofaro:
On the Feasibility of Acoustic Attacks Using Commodity Smart Devices. CoRR abs/2001.07157 (2020) - [i1]Dario Ortega Anderez, Eiman Kanjo, Ganna Pogrebna, Shane D. Johnson, John Alan Hunt:
A Modified Epidemiological Model to Understand the Uneven Impact of COVID-19 on Vulnerable Individuals and the Approaches Required to Help them Emerge from Lockdown. CoRR abs/2006.10495 (2020)
2010 – 2019
- 2019
- [j2]John M. Blythe, Nissy Sombatruang, Shane D. Johnson:
What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? J. Cybersecur. 5(1): tyz005 (2019) - [c1]Meha Shukla, Shane D. Johnson, Peter Jones:
Does the NIS implementation strategy effectively address cyber security risks in the UK? Cyber Security 2019: 1-11 - 2014
- [j1]Elio Marchione, Shane D. Johnson, Alan Wilson:
Modelling Maritime Piracy: A Spatial Approach. J. Artif. Soc. Soc. Simul. 17(2) (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint