標題: Titlebook: Advances in Human Factors in Cybersecurity; AHFE 2020 Virtual Co Isabella Corradini,Enrico Nardelli,Tareq Ahram Conference proceedings 2020 [打印本頁] 作者: KEN 時間: 2025-3-21 17:56
書目名稱Advances in Human Factors in Cybersecurity影響因子(影響力)
書目名稱Advances in Human Factors in Cybersecurity影響因子(影響力)學(xué)科排名
書目名稱Advances in Human Factors in Cybersecurity網(wǎng)絡(luò)公開度
書目名稱Advances in Human Factors in Cybersecurity網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Human Factors in Cybersecurity被引頻次
書目名稱Advances in Human Factors in Cybersecurity被引頻次學(xué)科排名
書目名稱Advances in Human Factors in Cybersecurity年度引用
書目名稱Advances in Human Factors in Cybersecurity年度引用學(xué)科排名
書目名稱Advances in Human Factors in Cybersecurity讀者反饋
書目名稱Advances in Human Factors in Cybersecurity讀者反饋學(xué)科排名
作者: 諷刺滑稽戲劇 時間: 2025-3-21 20:31 作者: Emg827 時間: 2025-3-22 02:19
,Expansion of China’s Textile Exports,analyzing an important line of research known as “behavioral economics”, pioneered by Kahneman and Tversky, and translated into cybersecurity terms. In this way we attempt to determine a cybersecurity analog for well-known results in economic prospect theory to be able to estimate the costs of cyberattacks and defenses.作者: GOAD 時間: 2025-3-22 05:57 作者: dithiolethione 時間: 2025-3-22 11:36 作者: Control-Group 時間: 2025-3-22 13:19
Environmental Politics and Theoryy duty of business executives to act in the best interest of a company. Lastly, we look at the concept of outlawing ransom payments and relate it the policy of outlawing random payments in kidnapping.作者: Aura231 時間: 2025-3-22 19:15
,Historical Overview of China’s Exports,ations of prototypes suggest that three visualizations are well suited for conveying this information. We believe these results generalizable and will enable the development of tactical situational awareness capabilities in Security Operations Centers across public and private enterprises.作者: Habituate 時間: 2025-3-22 23:17 作者: 歡樂東方 時間: 2025-3-23 04:31
Conference proceedings 2020olistic cyber protection for both individuals and organizations. By combining concepts and methods of engineering, education, computer science and psychology, it offers an inspiring guide for researchers and professionals, aswell as decision-makers, working at the interfaces of those fields.? ? ? ?.作者: acquisition 時間: 2025-3-23 08:41 作者: 大炮 時間: 2025-3-23 11:48 作者: SYN 時間: 2025-3-23 15:23
Thomas Chan,Noel Tracy,Zhu Wenhui2% in the identification of faked identities has been reached, even if errors were excluded from predictors and normalized features were included. The classification model performs similarly to those previously proposed, with a slightly lower accuracy (?3%) but overcoming their important practical limitations.作者: avarice 時間: 2025-3-23 21:06
,Macro-performance of China’s Export Sector,man limitations are outlined, in both an individual and social context. The difference between current systems and principles of interface and interaction design are highlighted. Finally, a possible ameliorating step is suggested. Specifically, a movement from reliance on human cognition and decision making to a reliance on habit formation.作者: Infuriate 時間: 2025-3-24 00:08 作者: 易達到 時間: 2025-3-24 03:45
https://doi.org/10.1057/9780230114364endencies will trust more in AS when compared to high risk seeking participants. Moreover, other individual differences like age, gender, and education led to interesting results. Thus, our study provides valuable information about the human factors that mediate human and autonomous systems interact作者: morale 時間: 2025-3-24 08:19 作者: neologism 時間: 2025-3-24 14:20 作者: Bricklayer 時間: 2025-3-24 17:45
,Development of China’s Electronic Exports,edy Stepwise algorithm, for attribute selection. Next, a Genetic Algorithm with a Neural Network model was trained to the set of sessions . to generate a unique behavior profile for each user. In this way, the anomalous or intrusive behaviors of each user were identified in a more approximate and ef作者: Fissure 時間: 2025-3-24 21:09 作者: 細胞膜 時間: 2025-3-25 01:13
Front Matterc propagation to estimate the achievable risetime. The third uses an equivalent circuit of a single channel spark gap to calculate the maximum achievable rate of voltage rise. The first two estimates indicate that risetimes on the order of 1–10 ps are achievable. The last treatment, however, illustr作者: Guaff豪情痛飲 時間: 2025-3-25 06:35
eded. In this sense, the compactness of the descriptor means that it should summarize the performance of the antenna (or antenna system) in a single parameter, in order to simplify its design using optimization techniques.Lamensdorf used a time domain approach, defining signal fidelity as a measure 作者: 藐視 時間: 2025-3-25 09:28 作者: 能得到 時間: 2025-3-25 15:37
Ethics, Economics, and Ransomware: How Human Decisions Grow the Threatn-depth topical conferences with published proceedings. The first conference was held in October, 1990 and was entitled Directions in Electromagnetic Wave Modeling. The proceedings of the conference were published under that title by Plenum Press. This volume constitutes the Proceedings of the secon作者: Instantaneous 時間: 2025-3-25 19:01
Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? is demonstrated by evaluating the distortion characteristics of an Asymptotic Conical Dipole (ACD) that is compared to that of a monopole antenna with the same sensitivity. Time-domain simulation is performed by solving an Electric Field Integral Equation (EFIE) using the Method of Moment. Simulate作者: instulate 時間: 2025-3-25 23:59
The Impact of Fake News on the African-American Communityttering events frequently observed in high resolution (~10 m) horizontally polarized radar returns [3] having amplitudes 10–20 dB higher than bragg model predictions and doppler shifts significantly larger than those predicted by two-scale models [4]. The physical mechanisms responsible for these sc作者: 衰老 時間: 2025-3-26 00:25
Ordnance Detec- tion and Range Remediation Conference (UXO) and the HPEMINEM Conference in Albuquerque, New Mexico during the period May 27-31, 1996. Planning is now underway for EUROEM ‘98 in June, 1998 in Tel Aviv, Israel. Joseph Shiloh is the conference chairman. A fourth UWB,SP meeting is plann作者: 希望 時間: 2025-3-26 06:21
Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamicser and the conductivities ratio σ./σ. could be determined. Figs. 3a and 3d, for example, could be used to measure the parameter D as the time occurence of the peak in the pulse response is greatly dependent on it. Also, Fig. 4 could be used to determine the ratio σ./σ. from the late time decay of th作者: 防水 時間: 2025-3-26 12:11 作者: 痛恨 時間: 2025-3-26 15:49 作者: 粗魯性質(zhì) 時間: 2025-3-26 17:50
Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform. As an affirmative verification of the validity of this relationship, Lau et al. [26] measured the modulation bandwidth of . laser diode at various low temperatures in order to increase the differential gain of the device . and, as such clearly demonstrated this effect. This result was further corr作者: BILE 時間: 2025-3-27 00:28 作者: 聚集 時間: 2025-3-27 03:41 作者: choroid 時間: 2025-3-27 06:25 作者: Postulate 時間: 2025-3-27 11:59
Developing Digital Awareness at School: A Fundamental Step for Cybersecurity Educationtics and heterogeneity make the percolation mechanism of ultradeep carbonate gas reservoirs more complicated. The traditional percolation theory of hydrocarbon reservoirs cannot accurately describe the percolation characteristics of this type of gas reservoir . It is necessary to deeply study the pe作者: 原告 時間: 2025-3-27 15:03 作者: 桉樹 時間: 2025-3-27 19:21
Economic Prospect Theory Applied to Cybersecuritynoply is only in its infancy, and our appreciation of most of its functional significance is even more rudimentary. Compared with the intensely studied and elaborately elucidated structural hierarchy of cellular components and constituents, the documentation of time structure is rather meagre; some 作者: overwrought 時間: 2025-3-28 01:40
2194-5357 methods of engineering, education, computer science and psychology, it offers an inspiring guide for researchers and professionals, aswell as decision-makers, working at the interfaces of those fields.? ? ? ?.978-3-030-52580-4978-3-030-52581-1Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 無力更進 時間: 2025-3-28 04:16
Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering 60 GHz ISM band including circuit implementation, UWB and 60 GHz signal transmission around and in-body, antenna design solution, hardware implementation of body sensors, UWB transceiver design, 60 GHz transce978-1-4899-7840-0978-1-4614-8896-5作者: 全部 時間: 2025-3-28 09:39
Advances in Human Factors in Cybersecurity978-3-030-52581-1Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 不出名 時間: 2025-3-28 13:56 作者: integral 時間: 2025-3-28 15:24
978-3-030-52580-4The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: Introvert 時間: 2025-3-28 22:05 作者: Generalize 時間: 2025-3-29 00:10
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/a/image/148228.jpg作者: allergy 時間: 2025-3-29 03:37 作者: TOXIN 時間: 2025-3-29 09:49 作者: Jejune 時間: 2025-3-29 14:25
Environmental Politics and Theory organizations). Within that timeframe, public reporting, articles, and news media reporting on large-scale ransomware attacks is reviewed to create an empirical analysis of ransom payments, conditions that led to those payments, and if data was ultimately recovered..Three factors were discovered th作者: 放大 時間: 2025-3-29 18:28
https://doi.org/10.1057/9780230114364 and retailing spaces. Although these AS seem to be riskless, if they are exploited they can endanger private information of users, which opens a new stage for the security of AS. Humans have an initial and positive bias towards automation that might lead to errors related to unintentional actions o作者: 最高點 時間: 2025-3-29 23:41
https://doi.org/10.1057/9780230114364 of such deceptive communication over many centuries, the sheer difference in deception techniques of such communication in an electronic environment has allowed the perpetrators the ability to disguise it in many forms that could not be seen in communication vehicles as print or electronic media su作者: Crepitus 時間: 2025-3-30 01:44
Thomas Chan,Noel Tracy,Zhu Wenhuine contexts. However, current techniques still suffer from some limits that restrict their practical application, such as the use of errors as a key feature to train the lie detectors and the absence of normalized features. Here, an extension of a keystroke dynamics technique, which was recently pro作者: 在駕駛 時間: 2025-3-30 05:44 作者: 小樣他閑聊 時間: 2025-3-30 12:10
,Development of China’s Electronic Exports, this research, during Shell sessions, the history of nine users (0–8) who performed tasks using the UNIX operating system for a period of two years was investigated. The main objective was to generate a classification model of usage profiles to detect anomalous behaviors in the system of each user.作者: 機密 時間: 2025-3-30 15:53
,Historical Overview of China’s Exports,allistic movements of 10 participants on the AML website. Hilbert-Huang transform was used to extract the frequency-domain information of 9 features such as speed and acceleration during mouse movement, and formed a frequency-domain feature matrix. The Bagged-tree algorithm was used to build an auth作者: 等級的上升 時間: 2025-3-30 17:54
,Historical Overview of China’s Exports,Command and control within security operations centers is dominated by fragile mental models, demonstrating a need for systems that reinforce shared situational awareness across the organization. In this paper, we present the results of our research to: (1) define the needs associated with tactical 作者: 完成 時間: 2025-3-31 00:36
Changes in Chinese Trade Theory since 1979, all operations of the companies. Indeed, cybersecurity potentially has an impact on financial reporting quality, this attribution being one of the duties of audit committees. Using Endsley’s model, our exploratory study seeks to determine the levels of cyber situational awareness of audit committee作者: 贊成你 時間: 2025-3-31 02:15
,Historical Overview of China’s Exports,ng different types of attacks. Particularly, as novel techniques (e.g., social engineering and phishing) are aimed at leveraging individual users’ vulnerabilities to attack and breach a larger system or an entire company, user awareness and behavior have become key factors in preventing adverse even作者: Triglyceride 時間: 2025-3-31 08:34
,Macro-performance of China’s Export Sector,he importance of usable security is well represented in early discussions ([.]; Sasse 2001). Twenty years after M. S. Ackerman [.] provided a significant discussion of the “gap” between what humans need and what computers can support, the “social-technical gap” in privacy and security management con作者: Engulf 時間: 2025-3-31 09:10