標(biāo)題: Titlebook: Human Aspects of Information Security, Privacy, and Trust; Third International Theo Tryfonas,Ioannis Askoxylakis Conference proceedings 20 [打印本頁] 作者: advocate 時(shí)間: 2025-3-21 16:54
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust網(wǎng)絡(luò)公開度
書目名稱Human Aspects of Information Security, Privacy, and Trust網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次
書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用
書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋
書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋學(xué)科排名
作者: JEER 時(shí)間: 2025-3-21 21:20 作者: 變形 時(shí)間: 2025-3-22 04:22
Investigating the Use of Gesture-Based Passwords by the Seniors. Preliminary studies suggest that users could learn the new password method in fairly short amount of time [.]. In this paper, we report an empirical user study to investigate how the seniors interact with the gesture password application.作者: Hemodialysis 時(shí)間: 2025-3-22 07:39 作者: 浸軟 時(shí)間: 2025-3-22 10:24
Adjustable Fusion to Support Cyber Security Operatorsthms, in order to add context to the alerts. We also present recommendations for designing future interactive application based on adjustable fusion and a risk assessment model, for cyber security monitoring.作者: Debrief 時(shí)間: 2025-3-22 15:02
Sarah N. Abdulkader,Ayman Atia,Mostafa-Sami M. Mostafa作者: FLORA 時(shí)間: 2025-3-22 18:15
Matthieu Devlin,Jason R. C. Nurse,Duncan Hodges,Michael Goldsmith,Sadie Creese作者: 集中營 時(shí)間: 2025-3-22 23:36 作者: Omnipotent 時(shí)間: 2025-3-23 02:29 作者: Femine 時(shí)間: 2025-3-23 07:38
Lakshmidevi Sreeramareddy,Pewu Mulbah,Jinjuan Heidi Feng作者: 講個(gè)故事逗他 時(shí)間: 2025-3-23 10:51 作者: 貪婪地吃 時(shí)間: 2025-3-23 17:07 作者: Interregnum 時(shí)間: 2025-3-23 20:00
Human Aspects of Information Security, Privacy, and TrustThird International 作者: compose 時(shí)間: 2025-3-24 00:02
Conference proceedings 2015 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.作者: Working-Memory 時(shí)間: 2025-3-24 02:40 作者: 波動 時(shí)間: 2025-3-24 09:39
Taolue Chen,Florian Kammüller,Ibrahim Nemli,Christian W. Probstche Gro?rechner als auch besonders kleine elektronische Tisch- rechner zeugen vom hohen Stand dieser Schaltungstechnik. Neben dieser Entwicklung hochintegrierter Halbleiterschaltungen wurde in den letzten zehn Jahren eine Vielzahl von Halbleiterbauelementen mit speziellen Eigenschaften ent- wickelt, die es er978-3-519-06418-3978-3-322-91850-5作者: acheon 時(shí)間: 2025-3-24 11:24
0302-9743 on, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.978-3-319-20375-1978-3-319-20376-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 額外的事 時(shí)間: 2025-3-24 14:54
Single Trial Authentication with Mental Password Writingenerated from mental writing of the user-owned password. Independent Component Analysis (ICA) and baseline correction has been used for preprocessing and noise removal. The effect of two types of features, multivariate autoregressive (MVAR) model parameters and power spectral density (PSD) features,作者: 改正 時(shí)間: 2025-3-24 19:27 作者: 散布 時(shí)間: 2025-3-24 23:22 作者: NOTCH 時(shí)間: 2025-3-25 06:11
Principles of Persuasion in Social Engineering and Their Use in Phishingcuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psychological triggers, and Stajano . principles of scams. It is unclear whether these relate but clearly so作者: Spartan 時(shí)間: 2025-3-25 10:49 作者: Distribution 時(shí)間: 2025-3-25 13:33
Effects of Password Permutation on Subjective Usability Across Platformso the password requirements found in higher-security enterprise environments. This research builds upon a series of studies at the National Institute of Standards and Technology by testing a previously proposed idea of password permutation: grouping like character classes together in order to improv作者: 不能約 時(shí)間: 2025-3-25 18:42 作者: collateral 時(shí)間: 2025-3-25 20:37 作者: 擦試不掉 時(shí)間: 2025-3-26 00:09 作者: ineptitude 時(shí)間: 2025-3-26 06:13 作者: Lucubrate 時(shí)間: 2025-3-26 09:13 作者: 暴發(fā)戶 時(shí)間: 2025-3-26 16:27
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication in the context of remote online learning. The logistical challenges and absence of live invigilation in remote un-supervised online examination makes the identification and authentication process extremely difficult. The authors implemented pre-defined text-based challenge questions for student aut作者: 易達(dá)到 時(shí)間: 2025-3-26 17:57 作者: JEER 時(shí)間: 2025-3-26 22:42
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivatior. We draw on Protection Motivation Theory (PMT) to uncover indirect influences of ISA programs, and seek to identify the extent to which intention translates into actual compliance is contingent on monitoring. Based on partial least squares structural equation modeling analysis of 183 survey respo作者: Loathe 時(shí)間: 2025-3-27 03:06
Analysis of Human Awareness of Security and Privacy Threats in Smart Environmentsty of life, energy efficiency and economical sustainability. In this perspective, the individual has a core role and so has networking, which enables such entities to cooperate. However, the huge amount of sensitive data, social aspects and the mixed set of protocols offer many opportunities to inje作者: Heresy 時(shí)間: 2025-3-27 07:33
A Probabilistic Analysis Framework for Malicious Insider Threatsthem to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework first identifies insiders’ intention to perform an insi作者: keloid 時(shí)間: 2025-3-27 09:36
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environmentll as to train users in isolated and controlled environment. Particularly, the paper focuses on the user environment and visualizations, providing views and interactions improving the understanding of processes emerged during experiments. Web user interface of the KYPO system supports several collab作者: 600 時(shí)間: 2025-3-27 15:14
Luca Caviglione,Jean-Fran?ois Lalande,Wojciech Mazurczyk,Steffen Wendzelwaren es vor allem die Fortschritte der Festk?rper- und Halbleiterphysik, die diese Entwicklung vorantrieben. W?hrend in den fünfziger Jahren die Schaltungstechnik in zunehmendem Ma?e den übergang von R?hren- zu Transistorschaltungen vollzog, wurde in den sechziger Jahren als weiterer Fortschritt de作者: Eclampsia 時(shí)間: 2025-3-27 20:17 作者: 香料 時(shí)間: 2025-3-28 01:52
Conference proceedings 2015ld as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address 作者: 暫時(shí)休息 時(shí)間: 2025-3-28 05:49
0302-9743 Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a caref作者: 組裝 時(shí)間: 2025-3-28 07:29
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objectsones judged by common sense, cause a feeling of strangeness. Usability survey suggests that the correct response rate is 90.5?% and the average response time is about 5.7?s. In addition, the CAPTCHA system is able to generate questions countlessly and easily by using 3DCG technologies. We also describe threats to its security.作者: 打擊 時(shí)間: 2025-3-28 12:37 作者: Tracheotomy 時(shí)間: 2025-3-28 15:14 作者: 間接 時(shí)間: 2025-3-28 19:07 作者: 杠桿 時(shí)間: 2025-3-29 00:08
Predicting Graphical Passwordsorrelated with an individual using memorable information (such as the individuals spouses, pets, preferred sports teams, children, and so on). This paper also introduces a novel metric for graphical-password strength to provide feedback to an individual without the requirement of knowing the image or having password statistics a priori.作者: 絕食 時(shí)間: 2025-3-29 04:54 作者: 伴隨而來 時(shí)間: 2025-3-29 09:34
Principles of Persuasion in Social Engineering and Their Use in Phishingishing is based on peer review and further research is needed to make it automatic, but the approach we follow, together with principles we propose, can be applied more consistently and more comprehensively than the original taxonomies.作者: POLYP 時(shí)間: 2025-3-29 14:13 作者: 等級的上升 時(shí)間: 2025-3-29 19:33 作者: Countermand 時(shí)間: 2025-3-29 22:57
The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-B is based on insight from previously gathered data from usability studies conducted at the United States National Institute of Standards and Technology. It also leverages web technologies to flexibly display data sets computed from sets of passwords. The tool is available at ..作者: Clinch 時(shí)間: 2025-3-30 00:06 作者: peak-flow 時(shí)間: 2025-3-30 04:58
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivatiitive behavioral effects of such programs to occur. However, ISA programs may cause a false sense of security, as vulnerability perceptions are reduced by consuming ISA programs but not affecting intentions for compliant security behavior. Perceived monitoring strengthens this confirmed intention-behavior link.作者: Nostalgia 時(shí)間: 2025-3-30 11:10 作者: 假 時(shí)間: 2025-3-30 13:44
978-3-319-20375-1Springer International Publishing Switzerland 2015作者: ATP861 時(shí)間: 2025-3-30 20:02
Human Aspects of Information Security, Privacy, and Trust978-3-319-20376-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 補(bǔ)充 時(shí)間: 2025-3-31 00:29 作者: INCUR 時(shí)間: 2025-3-31 00:58 作者: ostracize 時(shí)間: 2025-3-31 08:11
https://doi.org/10.1007/978-3-322-83344-0l organic molecules to biological macromolecules. The COSY spectrum displays the presence of scalar coupling between coupled spins A and X by the presence of a so-called cross peak centered about the frequency coordinates (F.,F.) = (..,..) and (..,..), where .. and .. are the chemical shift frequenc作者: 混合 時(shí)間: 2025-3-31 11:19 作者: 四目在模仿 時(shí)間: 2025-3-31 13:30
Crop Location by Oilseed Rape Pests and Host Location by Their Parasitoids,ate the crop, the habitat of their host larvae, from a distance, while visual cues are important for orientation at closer range. Once the crop is located, pests use taste and tactile cues from the oilseed rape plant to accept or reject it while parasitoids use host-derived cues to locate their host作者: commute 時(shí)間: 2025-3-31 18:49 作者: Licentious 時(shí)間: 2025-4-1 01:36 作者: Defiance 時(shí)間: 2025-4-1 05:19 作者: 諷刺 時(shí)間: 2025-4-1 08:26