IoT for 5G/B5G applications in smart homes, smart cities, wearables and connected cars H Uddin, M Gibson, GA Safdar, T Kalsoom, N Ramzan, M Ur-Rehman, ... 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design …, 2019 | 39 | 2019 |
Musipass: authenticating me softly with" my" song M Gibson, K Renaud, M Conrad, C Maple Proceedings of the 2009 workshop on New security paradigms workshop, 85-100, 2009 | 36 | 2009 |
Improving the immersion in virtual reality with real-time avatar and haptic feedback in a cricket simulation L Jayaraj, J Wood, M Gibson 2017 IEEE international symposium on mixed and augmented reality (ISMAR …, 2017 | 13 | 2017 |
Handbook of research on emerging developments in data privacy M Gupta IGI Global, 2014 | 9 | 2014 |
Engineering a mobile VR experience with MEMS 9DOF motion controller L Jayaraj, J Wood, M Gibson 2018 IEEE Games, Entertainment, Media Conference (GEM), 1-9, 2018 | 7 | 2018 |
Accessible and secure? Design constraints on image and sound based passwords M Gibson, M Conrad, C Maple, K Renaud 2010 International Conference on Information Society, 423-428, 2010 | 7 | 2010 |
A pragmatic and musically pleasing production system for sonic events M Conrad, T French, M Gibson Tenth International Conference on Information Visualisation (IV'06), 630-635, 2006 | 7 | 2006 |
Modes of Cyberstalking and Cyberharassment: Measuring the negative effects in the lives of victims in the UK A Brown, M Gibson, E Short Interactive Media Institute (IMI), 2017 | 6 | 2017 |
A practical guide to coping with cyberstalking." H Al-Khateeb, ZA Alhaboby, J Barnes, A Brown, R Brown, P Cobley, ... Luton: Andrews UK Limited, 2015 | 5 | 2015 |
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions: Technologies and Applied Solutions M Gupta IGI Global, 2012 | 5 | 2012 |
Cyber stalking is a social evil: from the Indian women's perspective A Miftha, M Conrad, M Gibson IADIS Press, 2019 | 4 | 2019 |
A cross cultural investigation into adoption of user controls in cyberstalking protection: A case study of Nigeria and the United Kingdom A Akinduko, E Ariwa, M Gibson 2017 Seventh International Conference on Innovative Computing Technology …, 2017 | 3 | 2017 |
Play that funky password!: recent advances in authentication with music M Gibson, K Renaud, M Conrad, C Maple Handbook of Research on Emerging Developments in Data Privacy, 101-132, 2015 | 3 | 2015 |
Infinite alphabet passwords: A unified model for a class of authentication systems M Gibson, M Conrad, C Maple 2010 International Conference on Security and Cryptography (SECRYPT), 1-6, 2010 | 3 | 2010 |
Marcia Gibson (2017).“Improving the Immersion in Virtual Reality with Real-Time Avatar and Haptic Feedback in a Cricket Simulation.” Wolfgang Broll et al.(eds)(2017) L Jayaraj, J Wood Adjunct Proceedings of the 2017 IEEE International Symposium on Mixed and …, 0 | 3 | |
Opening the Web for all: inclusive and secure design of an online authentication system M Gibson University of Bedfordshire, 2012 | 1 | 2012 |
Music is the key: using our enduring memory for songs to help users log on M Gibson, K Renaud, M Conrad, C Maple Strategic and Practical Approaches for Information Security Governance …, 2012 | 1 | 2012 |
Evaluating the Effectiveness of Image-based Password Design Paradigms using a Newly Developed Metric M Gibson, M Conrad, C Maple | 1 | |
The social, legal, and technical perspectives of cyberstalking in India A Miftha University of Bedfordshire, 2024 | | 2024 |
Setting social media privacy controls: a practical guide to protecting yourself A Brown, M Gibson, E Short, J Barnes Andrews UK, 2015 | | 2015 |