Follow
marcia gibson
Title
Cited by
Cited by
Year
IoT for 5G/B5G applications in smart homes, smart cities, wearables and connected cars
H Uddin, M Gibson, GA Safdar, T Kalsoom, N Ramzan, M Ur-Rehman, ...
2019 IEEE 24th International Workshop on Computer Aided Modeling and Design …, 2019
382019
Musipass: authenticating me softly with" my" song
M Gibson, K Renaud, M Conrad, C Maple
Proceedings of the 2009 workshop on New security paradigms workshop, 85-100, 2009
362009
Improving the immersion in virtual reality with real-time avatar and haptic feedback in a cricket simulation
L Jayaraj, J Wood, M Gibson
2017 IEEE international symposium on mixed and augmented reality (ISMAR …, 2017
112017
Handbook of research on emerging developments in data privacy
M Gupta
IGI Global, 2014
92014
Engineering a mobile VR experience with MEMS 9DOF motion controller
L Jayaraj, J Wood, M Gibson
2018 IEEE Games, Entertainment, Media Conference (GEM), 1-9, 2018
72018
Accessible and secure? Design constraints on image and sound based passwords
M Gibson, M Conrad, C Maple, K Renaud
2010 International Conference on Information Society, 423-428, 2010
72010
A pragmatic and musically pleasing production system for sonic events
M Conrad, T French, M Gibson
Tenth International Conference on Information Visualisation (IV'06), 630-635, 2006
72006
Modes of Cyberstalking and Cyberharassment: Measuring the negative effects in the lives of victims in the UK
A Brown, M Gibson, E Short
Interactive Media Institute (IMI), 2017
62017
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions: Technologies and Applied Solutions
M Gupta
IGI Global, 2012
52012
Cyber stalking is a social evil: from the Indian women's perspective
A Miftha, M Conrad, M Gibson
IADIS Press, 2019
42019
A practical guide to coping with cyberstalking."
H Al-Khateeb, ZA Alhaboby, J Barnes, A Brown, R Brown, P Cobley, ...
Luton: Andrews UK Limited, 2015
42015
A cross cultural investigation into adoption of user controls in cyberstalking protection: A case study of Nigeria and the United Kingdom
A Akinduko, E Ariwa, M Gibson
2017 Seventh International Conference on Innovative Computing Technology …, 2017
32017
Play that funky password!: recent advances in authentication with music
M Gibson, K Renaud, M Conrad, C Maple
Handbook of Research on Emerging Developments in Data Privacy, 101-132, 2015
32015
Infinite alphabet passwords: A unified model for a class of authentication systems
M Gibson, M Conrad, C Maple
2010 International Conference on Security and Cryptography (SECRYPT), 1-6, 2010
32010
Marcia Gibson (2017).“Improving the Immersion in Virtual Reality with Real-Time Avatar and Haptic Feedback in a Cricket Simulation.” Wolfgang Broll et al.(eds)(2017)
L Jayaraj, J Wood
Adjunct Proceedings of the 2017 IEEE International Symposium on Mixed and …, 0
3
Opening the Web for all: inclusive and secure design of an online authentication system
M Gibson
University of Bedfordshire, 2012
12012
Music is the key: using our enduring memory for songs to help users log on
M Gibson, K Renaud, M Conrad, C Maple
Strategic and Practical Approaches for Information Security Governance …, 2012
12012
Evaluating the Effectiveness of Image-based Password Design Paradigms using a Newly Developed Metric
M Gibson, M Conrad, C Maple
1
The social, legal, and technical perspectives of cyberstalking in India
A Miftha
University of Bedfordshire, 2024
2024
Setting social media privacy controls: a practical guide to protecting yourself
A Brown, M Gibson, E Short, J Barnes
Andrews UK, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20