Duncan Hodges
Cited by
Cited by
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
M Whitty, J Doodson, S Creese, D Hodges
Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015
A picture tells a thousand words: What Facebook and Twitter images convey about our personality
MT Whitty, J Doodson, S Creese, D Hodges
Personality and Individual Differences 133, 109-114, 2018
An attenuation time series model for propagation forecasting
DD Hodges, RJ Watson, G Wyman
Antennas and Propagation, IEEE Transactions on 54 (6), 1726-1733, 2006
Relationships between Password Choices, Perceptions of Risk and Security Expertise
S Creese, D Hodges, S Jamison-Powell, M Whitty
Human Aspects of Information Security, Privacy, and Trust, 80-89, 2013
A model for identity in the cyber and natural universes
D Hodges, S Creese, M Goldsmith
2012 European Intelligence and Security Informatics Conference, 115-122, 2012
Tools for understanding identity
S Creese, T Gibson-Robinson, M Goldsmith, D Hodges, D Kim, O Love, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces
L Emanuel, C Bevan, D Hodges
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 799-804, 2013
Personal information: Perceptions, types and evolution
RB Saglam, JRC Nurse, D Hodges
Journal of Information Security and Applications 66, 103163, 2022
Reconstructing what you said: Text Inference using Smartphone Motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry
RB Saglam, JRC Nurse, D Hodges
International Conference on Human-Computer Interaction, 391-399, 2021
Understanding cyber-attacks
D Hodges, S Creese
Cyber Warfare: A Multidisciplinary Analysis, 33, 2015
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
Generation of attenuation time-series for EHF SATCOM simulation
D Hodges, R Watson, A Page, P Watson
IEEE Military Communications Conference, 2003. MILCOM 2003. 1, 505-510, 2003
Breaking the arc: risk control for big data
D Hodges, S Creese
2013 IEEE International Conference on Big Data, 613-621, 2013
Analysis of the variability in the raindrop size distribution and its effect on attenuation at 20-40 GHz
AJ Townsend, RJ Watson, DD Hodges
IEEE Antennas and Wireless Propagation Letters 8, 1210-1213, 2009
Modelling and detection of rain attenuation for MF-TDMA satellite networks utilizing fade mitigation techniques
BC Grémont, RJ Watson, PA Watson, DD Hodges
COST 272 and 280 Satellite Communications–From Fade Mitigation to Service …, 2003
Predicting Graphical Passwords
M Devlin, JRC Nurse, D Hodges, M Goldsmith, S Creese
Human Aspects of Information Security, Privacy, and Trust, 23-35, 2015
Estimation of rainfall rate from terrestrial microwave link measurements
RJ Watson, DD Hodges
Geoscience and Remote Sensing Symposium, 2009 IEEE International, IGARSS …, 2009
An analysis of conditional site diversity: A study at ka-band
DD Hodges, RJ Watson
Antennas and Propagation, IEEE Transactions on 57 (3), 721-727, 2009
Initial comparisons of forecast attenuation and beacon measurements at 20 and 40 GHz
DD Hodges, RJ Watson
Antennas and Propagation, 2006. EuCAP 2006. First European Conference on, 1-6, 2006
The system can't perform the operation now. Try again later.
Articles 1–20