Duncan Hodges
Cited by
Cited by
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
M Whitty, J Doodson, S Creese, D Hodges
Cyberpsychology, Behavior, and Social Networking 18 (1), 3-7, 2015
A picture tells a thousand words: What Facebook and Twitter images convey about our personality
MT Whitty, J Doodson, S Creese, D Hodges
Personality and Individual Differences 133, 109-114, 2018
Relationships between Password Choices, Perceptions of Risk and Security Expertise
S Creese, D Hodges, S Jamison-Powell, M Whitty
Human Aspects of Information Security, Privacy, and Trust, 80-89, 2013
An attenuation time series model for propagation forecasting
DD Hodges, RJ Watson, G Wyman
Antennas and Propagation, IEEE Transactions on 54 (6), 1726-1733, 2006
Personal information: Perceptions, types and evolution
RB Saglam, JRC Nurse, D Hodges
Journal of Information Security and Applications 66, 103163, 2022
A model for identity in the cyber and natural universes
D Hodges, S Creese, M Goldsmith
2012 European Intelligence and Security Informatics Conference, 115-122, 2012
Tools for understanding identity
S Creese, T Gibson-Robinson, M Goldsmith, D Hodges, D Kim, O Love, ...
2013 IEEE International Conference on Technologies for Homeland Security …, 2013
Privacy Concerns in Chatbot Interactions: When to Trust and When to Worry
RB Saglam, JRC Nurse, D Hodges
International Conference on Human-Computer Interaction, 391-399, 2021
What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces
L Emanuel, C Bevan, D Hodges
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 799-804, 2013
Reconstructing what you said: Text Inference using Smartphone Motion
D Hodges, O Buckley
IEEE Transactions on Mobile Computing 18 (4), 947-959, 2018
An investigation into the sensitivity of personal information and implications for disclosure: A UK perspective
R Belen-Saglam, JRC Nurse, D Hodges
Frontiers in Computer Science 4, 908245, 2022
Understanding cyber-attacks
D Hodges, S Creese
Cyber Warfare: A Multidisciplinary Analysis, 33, 2015
Cyber-enabled burglary of smart homes
D Hodges
Computers & Security 110, 102418, 2021
Deconstructing who you play: Character choice in online gaming
D Hodges, O Buckley
Entertainment Computing 27, 170-178, 2018
Analysis of the variability in the raindrop size distribution and its effect on attenuation at 20-40 GHz
AJ Townsend, RJ Watson, DD Hodges
IEEE Antennas and Wireless Propagation Letters 8, 1210-1213, 2009
Generation of attenuation time-series for EHF SATCOM simulation
D Hodges, R Watson, A Page, P Watson
IEEE Military Communications Conference, 2003. MILCOM 2003. 1, 505-510, 2003
Breaking the arc: risk control for big data
D Hodges, S Creese
2013 IEEE International Conference on Big Data, 613-621, 2013
Modelling and detection of rain attenuation for MF-TDMA satellite networks utilizing fade mitigation techniques
BC Grémont, RJ Watson, PA Watson, DD Hodges
COST 272 and 280 Satellite Communications–From Fade Mitigation to Service …, 2003
Estimation of rainfall rate from terrestrial microwave link measurements
RJ Watson, DD Hodges
Geoscience and Remote Sensing Symposium, 2009 IEEE International, IGARSS …, 2009
An analysis of conditional site diversity: A study at ka-band
DD Hodges, RJ Watson
Antennas and Propagation, IEEE Transactions on 57 (3), 721-727, 2009
The system can't perform the operation now. Try again later.
Articles 1–20