派博傳思國際中心

標(biāo)題: Titlebook: Human Aspects of Information Security, Privacy, and Trust; Third International Theo Tryfonas,Ioannis Askoxylakis Conference proceedings 20 [打印本頁]

作者: advocate    時(shí)間: 2025-3-21 16:54
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)




書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust網(wǎng)絡(luò)公開度




書目名稱Human Aspects of Information Security, Privacy, and Trust網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次




書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用




書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋




書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋學(xué)科排名





作者: JEER    時(shí)間: 2025-3-21 21:20

作者: 變形    時(shí)間: 2025-3-22 04:22
Investigating the Use of Gesture-Based Passwords by the Seniors. Preliminary studies suggest that users could learn the new password method in fairly short amount of time [.]. In this paper, we report an empirical user study to investigate how the seniors interact with the gesture password application.
作者: Hemodialysis    時(shí)間: 2025-3-22 07:39

作者: 浸軟    時(shí)間: 2025-3-22 10:24
Adjustable Fusion to Support Cyber Security Operatorsthms, in order to add context to the alerts. We also present recommendations for designing future interactive application based on adjustable fusion and a risk assessment model, for cyber security monitoring.
作者: Debrief    時(shí)間: 2025-3-22 15:02
Sarah N. Abdulkader,Ayman Atia,Mostafa-Sami M. Mostafa
作者: FLORA    時(shí)間: 2025-3-22 18:15
Matthieu Devlin,Jason R. C. Nurse,Duncan Hodges,Michael Goldsmith,Sadie Creese
作者: 集中營    時(shí)間: 2025-3-22 23:36

作者: Omnipotent    時(shí)間: 2025-3-23 02:29

作者: Femine    時(shí)間: 2025-3-23 07:38
Lakshmidevi Sreeramareddy,Pewu Mulbah,Jinjuan Heidi Feng
作者: 講個(gè)故事逗他    時(shí)間: 2025-3-23 10:51

作者: 貪婪地吃    時(shí)間: 2025-3-23 17:07

作者: Interregnum    時(shí)間: 2025-3-23 20:00
Human Aspects of Information Security, Privacy, and TrustThird International
作者: compose    時(shí)間: 2025-3-24 00:02
Conference proceedings 2015 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
作者: Working-Memory    時(shí)間: 2025-3-24 02:40

作者: 波動    時(shí)間: 2025-3-24 09:39
Taolue Chen,Florian Kammüller,Ibrahim Nemli,Christian W. Probstche Gro?rechner als auch besonders kleine elektronische Tisch- rechner zeugen vom hohen Stand dieser Schaltungstechnik. Neben dieser Entwicklung hochintegrierter Halbleiterschaltungen wurde in den letzten zehn Jahren eine Vielzahl von Halbleiterbauelementen mit speziellen Eigenschaften ent- wickelt, die es er978-3-519-06418-3978-3-322-91850-5
作者: acheon    時(shí)間: 2025-3-24 11:24
0302-9743 on, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.978-3-319-20375-1978-3-319-20376-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 額外的事    時(shí)間: 2025-3-24 14:54
Single Trial Authentication with Mental Password Writingenerated from mental writing of the user-owned password. Independent Component Analysis (ICA) and baseline correction has been used for preprocessing and noise removal. The effect of two types of features, multivariate autoregressive (MVAR) model parameters and power spectral density (PSD) features,
作者: 改正    時(shí)間: 2025-3-24 19:27

作者: 散布    時(shí)間: 2025-3-24 23:22

作者: NOTCH    時(shí)間: 2025-3-25 06:11
Principles of Persuasion in Social Engineering and Their Use in Phishingcuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psychological triggers, and Stajano . principles of scams. It is unclear whether these relate but clearly so
作者: Spartan    時(shí)間: 2025-3-25 10:49

作者: Distribution    時(shí)間: 2025-3-25 13:33
Effects of Password Permutation on Subjective Usability Across Platformso the password requirements found in higher-security enterprise environments. This research builds upon a series of studies at the National Institute of Standards and Technology by testing a previously proposed idea of password permutation: grouping like character classes together in order to improv
作者: 不能約    時(shí)間: 2025-3-25 18:42

作者: collateral    時(shí)間: 2025-3-25 20:37

作者: 擦試不掉    時(shí)間: 2025-3-26 00:09

作者: ineptitude    時(shí)間: 2025-3-26 06:13

作者: Lucubrate    時(shí)間: 2025-3-26 09:13

作者: 暴發(fā)戶    時(shí)間: 2025-3-26 16:27
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication in the context of remote online learning. The logistical challenges and absence of live invigilation in remote un-supervised online examination makes the identification and authentication process extremely difficult. The authors implemented pre-defined text-based challenge questions for student aut
作者: 易達(dá)到    時(shí)間: 2025-3-26 17:57

作者: JEER    時(shí)間: 2025-3-26 22:42
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivatior. We draw on Protection Motivation Theory (PMT) to uncover indirect influences of ISA programs, and seek to identify the extent to which intention translates into actual compliance is contingent on monitoring. Based on partial least squares structural equation modeling analysis of 183 survey respo
作者: Loathe    時(shí)間: 2025-3-27 03:06
Analysis of Human Awareness of Security and Privacy Threats in Smart Environmentsty of life, energy efficiency and economical sustainability. In this perspective, the individual has a core role and so has networking, which enables such entities to cooperate. However, the huge amount of sensitive data, social aspects and the mixed set of protocols offer many opportunities to inje
作者: Heresy    時(shí)間: 2025-3-27 07:33
A Probabilistic Analysis Framework for Malicious Insider Threatsthem to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework first identifies insiders’ intention to perform an insi
作者: keloid    時(shí)間: 2025-3-27 09:36
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environmentll as to train users in isolated and controlled environment. Particularly, the paper focuses on the user environment and visualizations, providing views and interactions improving the understanding of processes emerged during experiments. Web user interface of the KYPO system supports several collab
作者: 600    時(shí)間: 2025-3-27 15:14
Luca Caviglione,Jean-Fran?ois Lalande,Wojciech Mazurczyk,Steffen Wendzelwaren es vor allem die Fortschritte der Festk?rper- und Halbleiterphysik, die diese Entwicklung vorantrieben. W?hrend in den fünfziger Jahren die Schaltungstechnik in zunehmendem Ma?e den übergang von R?hren- zu Transistorschaltungen vollzog, wurde in den sechziger Jahren als weiterer Fortschritt de
作者: Eclampsia    時(shí)間: 2025-3-27 20:17

作者: 香料    時(shí)間: 2025-3-28 01:52
Conference proceedings 2015ld as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address
作者: 暫時(shí)休息    時(shí)間: 2025-3-28 05:49
0302-9743 Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a caref
作者: 組裝    時(shí)間: 2025-3-28 07:29
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objectsones judged by common sense, cause a feeling of strangeness. Usability survey suggests that the correct response rate is 90.5?% and the average response time is about 5.7?s. In addition, the CAPTCHA system is able to generate questions countlessly and easily by using 3DCG technologies. We also describe threats to its security.
作者: 打擊    時(shí)間: 2025-3-28 12:37

作者: Tracheotomy    時(shí)間: 2025-3-28 15:14

作者: 間接    時(shí)間: 2025-3-28 19:07

作者: 杠桿    時(shí)間: 2025-3-29 00:08
Predicting Graphical Passwordsorrelated with an individual using memorable information (such as the individuals spouses, pets, preferred sports teams, children, and so on). This paper also introduces a novel metric for graphical-password strength to provide feedback to an individual without the requirement of knowing the image or having password statistics a priori.
作者: 絕食    時(shí)間: 2025-3-29 04:54

作者: 伴隨而來    時(shí)間: 2025-3-29 09:34
Principles of Persuasion in Social Engineering and Their Use in Phishingishing is based on peer review and further research is needed to make it automatic, but the approach we follow, together with principles we propose, can be applied more consistently and more comprehensively than the original taxonomies.
作者: POLYP    時(shí)間: 2025-3-29 14:13

作者: 等級的上升    時(shí)間: 2025-3-29 19:33

作者: Countermand    時(shí)間: 2025-3-29 22:57
The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-B is based on insight from previously gathered data from usability studies conducted at the United States National Institute of Standards and Technology. It also leverages web technologies to flexibly display data sets computed from sets of passwords. The tool is available at ..
作者: Clinch    時(shí)間: 2025-3-30 00:06

作者: peak-flow    時(shí)間: 2025-3-30 04:58
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivatiitive behavioral effects of such programs to occur. However, ISA programs may cause a false sense of security, as vulnerability perceptions are reduced by consuming ISA programs but not affecting intentions for compliant security behavior. Perceived monitoring strengthens this confirmed intention-behavior link.
作者: Nostalgia    時(shí)間: 2025-3-30 11:10

作者: 假    時(shí)間: 2025-3-30 13:44
978-3-319-20375-1Springer International Publishing Switzerland 2015
作者: ATP861    時(shí)間: 2025-3-30 20:02
Human Aspects of Information Security, Privacy, and Trust978-3-319-20376-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 補(bǔ)充    時(shí)間: 2025-3-31 00:29

作者: INCUR    時(shí)間: 2025-3-31 00:58

作者: ostracize    時(shí)間: 2025-3-31 08:11
https://doi.org/10.1007/978-3-322-83344-0l organic molecules to biological macromolecules. The COSY spectrum displays the presence of scalar coupling between coupled spins A and X by the presence of a so-called cross peak centered about the frequency coordinates (F.,F.) = (..,..) and (..,..), where .. and .. are the chemical shift frequenc
作者: 混合    時(shí)間: 2025-3-31 11:19

作者: 四目在模仿    時(shí)間: 2025-3-31 13:30
Crop Location by Oilseed Rape Pests and Host Location by Their Parasitoids,ate the crop, the habitat of their host larvae, from a distance, while visual cues are important for orientation at closer range. Once the crop is located, pests use taste and tactile cues from the oilseed rape plant to accept or reject it while parasitoids use host-derived cues to locate their host
作者: commute    時(shí)間: 2025-3-31 18:49

作者: Licentious    時(shí)間: 2025-4-1 01:36

作者: Defiance    時(shí)間: 2025-4-1 05:19

作者: 諷刺    時(shí)間: 2025-4-1 08:26





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
常山县| 宁武县| 三明市| 孙吴县| 广东省| 霍林郭勒市| 胶南市| 达拉特旗| 定西市| 哈尔滨市| 邹平县| 南平市| 遂川县| 修水县| 聊城市| 杭州市| 西乌珠穆沁旗| 麻栗坡县| 遵化市| 芦山县| 安宁市| 冷水江市| 兖州市| 万载县| 丰原市| 芷江| 石屏县| 海阳市| 修水县| 云龙县| 南昌市| 鄯善县| 东莞市| 彰武县| 涞源县| 金阳县| 石河子市| 荆州市| 大姚县| 剑阁县| 高邑县|