default search action
George R. S. Weir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]George R. S. Weir, Andreas Aßmuth:
Strategies for Intrusion Monitoring in Cloud Services. CoRR abs/2405.02070 (2024) - [i2]George R. S. Weir, Andreas Aßmuth, Nicholas Jäger:
Managing Forensic Recovery in the Cloud. CoRR abs/2405.06455 (2024) - [i1]Fabian Süß, Marco Freimuth, Andreas Aßmuth, George R. S. Weir, Bob Duncan:
Cloud Security and Security Challenges Revisited. CoRR abs/2405.11350 (2024) - 2020
- [j9]Samar Muslah Albladi, George R. S. Weir:
Predicting individuals' vulnerability to social engineering in social networks. Cybersecur. 3(1): 7 (2020)
2010 – 2019
- 2019
- [c27]Samar Muslah Albladi, George R. S. Weir:
A Conceptual Model to Predict Social Engineering Victims. ICGS3 2019 - 2018
- [j8]Samar Muslah Albladi, George R. S. Weir:
User characteristics that influence judgment of social engineering attacks in social networks. Hum. centric Comput. Inf. Sci. 8: 5 (2018) - [c26]Samar Muslah Albladi, George R. S. Weir:
A Semi-automated Security Advisory System to Resist Cyber-Attack in Social Networks. ICCCI (1) 2018: 146-156 - 2017
- [c25]Yazeed Alkhurayyif, George R. S. Weir:
Readability as a basis for information security policy assessment. EST 2017: 114-121 - [c24]Samar Muslah Albladi, George R. S. Weir:
Competence measure in social networks. ICCST 2017: 1-6 - 2016
- [c23]Fathiya Al Izki, George R. S. Weir:
Management Attitudes toward Information Security in Omani Public Sector Organisations. CCC 2016: 107-112 - [c22]Karen Renaud, George R. S. Weir:
Cybersecurity and the Unbearability of Uncertainty. CCC 2016: 137-143 - [c21]Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, George R. S. Weir:
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors. CCC 2016: 144-150 - 2015
- [c20]Gregor Robinson, George R. S. Weir:
Understanding Android Security. ICGS3 2015: 189-199 - [c19]Fathiya Al Izki, George R. S. Weir:
Gender Impact on Information Security in the Arab World. ICGS3 2015: 200-207 - [c18]Najla Etaher, George R. S. Weir, Mamoun Alazab:
From ZeuS to Zitmo: Trends in Banking Malware. TrustCom/BigDataSE/ISPA (1) 2015: 1386-1391 - 2011
- [j7]George R. S. Weir, Fergus Toolan, Duncan N. Smeed:
The threats of social networking: Old wine in new bottles? Inf. Secur. Tech. Rep. 16(2): 38-43 (2011) - [c17]Russell Ogilvie, George R. S. Weir:
Genre-Based Information Hiding. ICGS3/e-Democracy 2011: 104-111 - 2010
- [j6]Sean Garrity, George R. S. Weir:
Balancing the threat of personal technology in the workplace. Int. J. Electron. Secur. Digit. Forensics 3(1): 73-81 (2010) - [j5]George R. S. Weir, Michael Morran:
Hiding the hidden message: approaches to textual steganography. Int. J. Electron. Secur. Digit. Forensics 3(3): 223-233 (2010) - [c16]Michael Morran, George R. S. Weir:
An Approach to Textual Steganography. ICGS3 2010: 48-54
2000 – 2009
- 2009
- [j4]Iain Moir, George R. S. Weir:
Contact centres and identity theft. Int. J. Electron. Secur. Digit. Forensics 2(1): 92-100 (2009) - 2008
- [j3]Susan Burns, George R. S. Weir:
Varieties of smartcard fraud. Int. J. Electron. Secur. Digit. Forensics 1(4): 374-386 (2008) - 2007
- [c15]George R. S. Weir, Nikolaos K. Anagnostou:
Optimising content clarity for human-machine systems. IFAC HMS 2007: 314-319 - 2005
- [c14]George R. S. Weir, Tamar Vilner, António José Mendes, Marie Nordström:
Difficulties teaching Java in CS1 and how we aim to solve them. ITiCSE 2005: 344-345 - 2004
- [c13]Mohamed Rehman, John D. Ferguson, David Elsweiler, Alasdair Mac Cormack, John N. Wilson, George R. S. Weir:
BulB - Visualising Bulletin Board Activity. ICEIS (4) 2004: 31-35 - [c12]George R. S. Weir, George Lepouras, Costas Vassilakis:
Content Enrichment Through Dynamic Annotation. ICEIS (5) 2004: 152-157 - 2003
- [j2]Giorgos Lepouras, George R. S. Weir:
Subtitled interaction: complementary support as an alternative to localization. Int. J. Hum. Comput. Stud. 59(6): 941-957 (2003) - [c11]George R. S. Weir, George Lepouras:
Tools for Second Language Support. HCI (4) 2003: 1238-1242 - 2002
- [c10]George Lepouras, Costas Vassilakis, George R. S. Weir:
Serving Enhanced Hypermedia Information. ECIR 2002: 86-92 - [c9]George R. S. Weir:
The Rigours of On-Line Student Assessment - Lessons from E-Commerce. ICCE 2002: 840-843 - 2001
- [c8]George R. S. Weir, Giorgos Lepouras:
Localisation and linguistic anomalies. HCI 2001: 535-539 - [c7]George R. S. Weir, Giorgos Lepouras:
English Assistant: A Support Strategy for On-Line Second Language Learning. ICALT 2001: 125-126 - [c6]Nikolaos Kotsis, George R. S. Weir, John D. Ferguson, Douglas R. McGregor:
Novel Data Visualisation and Exploration in Multidimensional Datasets. ICEIS (1) 2001: 170-175 - 2000
- [c5]John D. Ferguson, James Miller, George R. S. Weir:
Design and Deployment Decisions within an E-Commerce Environment. WebNet 2000: 176-180 - [c4]George R. S. Weir, John D. Ferguson, James Miller:
Managing Educational Web-dependence. WebNet 2000: 575-580
1990 – 1999
- 1999
- [j1]Giorgos Lepouras, George R. S. Weir:
It's not Greek to me: terminology and the second language problem. ACM SIGCHI Bull. 31(2): 17-24 (1999) - [c3]John D. Ferguson, George R. S. Weir, John N. Wilson:
Web Centric Education - a Challenge for Process Redesign. WebNet 1999: 372-376 - [c2]John D. Ferguson, James Miller, George R. S. Weir:
Estimating the Number of Defects at a WWW Site. WebNet 1999: 377-381 - 1996
- [c1]George R. S. Weir, Giorgos Lepouras, Ulysses Sakellaridis:
Second-Language Help for Windows Applications. BCS HCI 1996: 129-138 - 1994
- [e1]Gilbert Cockton, Stephen W. Draper, George R. S. Weir:
People and Computers IX, Proceedings of HCI '94, Glasgow, UK, August 1994. Cambridge University Press 1994, ISBN 0-521-48557-6 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint