


default search action
AHFE 2017: Los Angeles, CA, USA
- Denise Nicholson:

Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA. Advances in Intelligent Systems and Computing 593, Springer 2018, ISBN 978-3-319-60584-5
Cybersecurity Tools and Analytics
- Michael Muggler, Rekha Eshwarappa, Ebru Celikel Cankaya:

Cybersecurity Management Through Logging Analytics. 3-15 - Phillip H. Griffin

:
Adaptive Weak Secrets for Authenticated Key Exchange. 16-25 - Mohammed AlSaudi Ali, Dyaa Motawa, Fahad M. Al-Harby:

Internet of Things and Distributed Denial of Service Mitigation. 26-36 - Martin Mihajlov

, Borka Jerman-Blazic:
Eye Tracking Graphical Passwords. 37-44 - Abdullaziz A. Sarhan, Shehab A. Farhan, Fahad M. Al-Harby:

Understanding and Discovering SQL Injection Vulnerabilities. 45-51 - Paul Biocco, Mohd Anwar:

Grid Framework to Address Password Memorability Issues and Offline Password Attacks. 52-61 - Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won:

Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards. 62-71 - Jongho Moon, Taeui Song, Donghoon Lee, Youngsook Lee, Dongho Won:

Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security. 72-77 - Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won:

Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. 78-84
Cybersecurity Interface and Metrics
- Christian Zinke

, Jürgen Anke
, Kyrill Meyer
, Johannes Schmidt
:
Modeling, Analysis and Control of Personal Data to Ensure Data Privacy - A Use Case Driven Approach. 87-96 - Kirsten E. Richards, Anthony F. Norcio:

Exploring the Discoverability of Personal Data Used for Authentication. 97-105 - Florian Kammüller:

Human Centric Security and Privacy for the IoT Using Formal Techniques. 106-116 - Lauren Massey, Remzi Seker, Denise Nicholson:

Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations. 117-129
Human Factors in Cyber-Warfare
- Scott D. Lathrop:

Interacting with Synthetic Teammates in Cyberspace. 133-145 - Kenneth D. Nguyen, Heather Rosoff, Richard S. John:

Valuing Information Security from a Phishing Attack. 146-157 - Barry L. Drake, Tiffany Huang, Ashley Beavers, Rundong Du, Haesun Park:

Event Detection Based on Nonnegative Matrix Factorization: Ceasefire Violation, Environmental, and Malware Events. 158-169
Human Dimension and Visualization for Cybersecurity
- Johan de Heer, Paul Porskamp:

Human Behavior Analytics from Microworlds: The Cyber Security Game. 173-184 - Char Sample, Jennifer Cowley, Steve E. Hutchinson, Jonathan Z. Bakdash

:
Culture + Cyber: Exploring the Relationship. 185-196 - Steve Beitzel, Josiah Dykstra, Paul Toliver, Jason Youzwak:

Exploring 3D Cybersecurity Visualization with the Microsoft HoloLens. 197-207
Cybersecurity Training and Education
- Fernando Maymí, Angela Woods, Jeremiah T. Folsom-Kovarik:

Humans as the Strong Link in Securing the Total Learning Architecture. 211-223 - Balázs Péter Hámornik, Csaba Krasznay:

A Team-Level Perspective of Human Factors in Cyber Security: Security Operations Centers. 224-236 - Saurabh Dutta, Ger Joyce, Jay Brewer:

Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners. 237-243 - Heather Young, Tony van Vliet, Josine G. M. van de Ven, Steven Jol, Carlijn Broekman:

Understanding Human Factors in Cyber Security as a Dynamic System. 244-254
Privacy and Cultural Factors in Cybersecurity
- Scott Cadzow:

Preserving Dignity, Maintaining Security and Acting Ethically. 257-268 - Henry W. Glaspie, Waldemar Karwowski

:
Human Factors in Information Security Culture: A Literature Review. 269-280 - Wayne Patterson, Jacari Boboye, Sidney Hall, Maalik Hornbuckle:

The Gender Turing Test. 281-289 - Abbas Moallem

:
Do You Really Trust "Privacy Policy" or "Terms of Use" Agreements Without Reading Them? 290-295 - Aseel Addawood, Yixin Zou, Masooda N. Bashir

:
Users' Attitudes Towards the "Going Dark" Debate. 296-307 - Tihomir Orehovacki

, Snjezana Babic
, Darko Etinger:
Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings. 308-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














