Abstract
I saw percentages interested, that’s like the numbers who responded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This comment referred to an earlier version but no longer applies to the corrected post-proceedings version of the paper.
Reference
Cao, A., Dolan-Gavitt, B.: What the fork? finding and analyzing malware in GitHub forks. In: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), San Diego, CA, USA (2022). https://doi.org/10.14722/madweb.2022.23001
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kruzikova, A. (2023). Authentication of IT Professionals in the Wild – A Survey (Transcript of Discussion). In: Stajano, F., Matyáš, V., Christianson, B., Anderson, J. (eds) Security Protocols XXVIII. Security Protocols 2023. Lecture Notes in Computer Science, vol 14186. Springer, Cham. https://doi.org/10.1007/978-3-031-43033-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-43033-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43032-9
Online ISBN: 978-3-031-43033-6
eBook Packages: Computer ScienceComputer Science (R0)