Profil

FERREIRA Ana

Main Referenced Co-authors
LENZINI, Gabriele  (10)
HUYNEN, Jean-Louis  (7)
KOENIG, Vincent  (6)
BORDAS, Stéphane  (2)
Carrera, E. (2)
Main Referenced Keywords
Shear locking (2); Access control override (1); Carrera Unified Formulation (1); Carrera's unified formulation (1); Cell-based smoothed finite element (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust - SnT (6)
SnT (2)
Interdisciplinary Centre for Security, Reliability and Trust (1)
Main Referenced Disciplines
Computer science (9)
Engineering, computing & technology: Multidisciplinary, general & others (3)
Electrical & electronics engineering (1)

Publications (total 13)

The most downloaded
3296 downloads
Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 https://hdl.handle.net/10993/20301

The most cited

64 citations (Scopus®)

Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 https://hdl.handle.net/10993/20301

Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4
Peer reviewed

Lenzini, G., & Ferreira, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? In Advances in Intelligent Systems and Computing. Springer. doi:10.1007/978-3-319-16486-1_111
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334. doi:10.1007/978-3-319-20376-8_29
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S. Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer. doi:10.1007/978-3-319-24858-5_16
Peer reviewed

Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. In IEEE 3rd International Conference on Serious Games and Applications in Healthcare.
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_28
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_27
Peer reviewed

Rodrigues, J. D., Natarajan, S., Ferreira, A., Carrera, E., Cinefra, M., & Bordas, S. (2014). Analysis of composite plates through cell-based smoothed finite element and 4-noded mixed interpolation of tensorial components techniques. Computers and Structures, 135, 83-87. doi:10.1016/j.compstruc.2014.01.011
Peer Reviewed verified by ORBi

Ferreira, A. (July 2013). Log analysis of human computer interactions regarding Break The Glass accesses to genetic reports [Paper presentation]. 15th International Conference on Enterprise Information Systems.

Ferreira, A., Giustolisi, R., Huynen, J.-L., & Lenzini, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg.

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143. doi:10.1007/978-3-642-41098-7_9
Peer reviewed

Ferreira, A., Giustolisi, R., Huynen, J.-L., Koenig, V., & Lenzini, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190
Peer reviewed

Natarajan, S., Ferreira, A., Bordas, S., Carrera, E., & Cinefra, M. (2013). Analysis of composite plates by a unified formulation-cell based smoothed finite element method and field consistent elements. Composite Structures, 105, 75-81. doi:10.1016/j.compstruct.2013.04.040
Peer Reviewed verified by ORBi

Contact ORBilu