default search action
Marton Gergely
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Amjad Abu-Mahfouz, Saed Alrabaee, Mahmoud Khasawneh, Marton Gergely, Kim-Kwang Raymond Choo:
A Deep Learning Approach to Discover Router Firmware Vulnerabilities. IEEE Trans. Ind. Informatics 20(1): 691-702 (2024) - 2023
- [c8]Heba Saleous, Marton Gergely:
Uninstall, Noob! Views on Rampant Toxicity in Online Gaming. DASC/PiCom/CBDCom/CyberSciTech 2023: 183-190 - [c7]Heba Saleous, Marton Gergely, Khaled Shuaib:
Utilization of Artificial Intelligence for Social Media and Gaming Moderation. IIT 2023: 246-251 - 2022
- [j3]Marton Gergely, V. Srinivasan (Chino) Rao:
Liar, liar, pants on fire! Social desirability bias in software piracy research. Behav. Inf. Technol. 41(13): 2796-2818 (2022) - 2021
- [c6]Heba Saleous, Marton Gergely:
A Peek at the Digital Forensics Landscape. ECIS 2021 - 2020
- [j2]Nabeel A. Y. Al-Qirim, Kamel Rouibah, Mohamad Adel Serhani, Ali Tarhini, Mahmoud Maqableh, Ashraf Khalil, Marton Gergely:
Antecedents to academic success in higher education institutions: The case of UAE University. Educ. Inf. Technol. 25(3): 1663-1688 (2020) - [c5]Wayne Patterson, Marton Gergely:
Economic Prospect Theory Applied to Cybersecurity. AHFE (19) 2020: 113-121 - [p3]Nabeel A. Y. Al-Qirim, Kamel Rouibah, Mohamad Adel Serhani, Ashraf Khalil, Ali Tarhini, Marton Gergely, Mahmoud Maqableh:
Learning Strategies and Achievement of IT Students in Higher Education. Encyclopedia of Education and Information Technologies 2020: 1-10 - [p2]Nabeel A. Y. Al-Qirim, Kamel Rouibah, Mohamad Adel Serhani, Ashraf Khalil, Ali Tarhini, Mahmoud Maqableh, Marton Gergely:
Innate Abilities and Learning in Higher Education. Encyclopedia of Education and Information Technologies 2020: 1-6 - [p1]Nabeel A. Y. Al-Qirim, Kamel Rouibah, Mohamad Adel Serhani, Ashraf Khalil, Ali Tarhini, Mahmoud Maqableh, Marton Gergely:
Smart Board Technology in Higher Education Institutions. Encyclopedia of Education and Information Technologies 2020: 1-13
2010 – 2019
- 2018
- [j1]Alramzana Nujum Navaz, Mohamed Adel Serhani, Nabeel A. Y. Al-Qirim, Marton Gergely:
Towards an efficient and Energy-Aware mobile big health data architecture. Comput. Methods Programs Biomed. 166: 137-154 (2018) - 2017
- [c4]Marton Gergely, V. Srinivasan Chino Rao, Nora Eisa Al Khaili:
A Cross-National Experimental Examination of Software Piracy Behavior. AMCIS 2017 - 2016
- [c3]Marton Gergely, V. Srinivasan Chino Rao:
Social desirability bias in software piracy research: Evidence from pilot studies. IIT 2016: 1-4 - 2014
- [c2]Marton Gergely, V. Srinivasan Chino Rao:
Social desirability Bias in Software Piracy Research. ECIS 2014 - 2013
- [c1]Marton Gergely, V. Srinivasan Chino Rao:
Schools of Thought in Software Piracy Research. AMCIS 2013
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint