


default search action
HCI 2024: Washington, DC, USA - Volume 46
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29 - July 4, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14729, Springer 2024, ISBN 978-3-031-61381-4
Cybersecurity Education and Training
- Aida Akbarzadeh
, Laszlo Erdodi
, Siv Hilde Houmb
, Tore Geir Soltvedt:
Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security. 3-19 - Marko Arik
, Ricardo Gregorio Lugo
, Rain Ottis
, Adrian Nicholas Venables
:
Competencies Required for the Offensive Cyber Operations Planners. 20-39 - Danielle Renee Jacobs
, Nicole Darmawaskita
, Troy McDaniel
:
Unraveling the Real-World Impacts of Cyber Incidents on Individuals. 40-55 - Anthony Lee
, Kenneth King
, Denis Gracanin
, Mohamed Azab
:
Experiential Learning Through Immersive XR: Cybersecurity Education for Critical Infrastructures. 56-69 - Michail Loupasakis, Georgios Potamos
, Eliana Stavrou
:
Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-Powered Investigations in the Maritime Domain. 70-83 - Xhesika Ramaj
, Mary Sánchez-Gordón
, Ricardo Colomo Palacios
, Vasileios Gkioulos
:
Training and Security Awareness Under the Lens of Practitioners: A DevSecOps Perspective Towards Risk Management. 84-97 - Jan Tolsdorf
, Luigi Lo Iacono
:
Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany. 98-117
Threat Assessment and Protection
- Qian Luo
, Kalyani Vinayagam Sivasundari:
Whisper+AASIST for DeepFake Audio Detection. 121-133 - Håvard Jakobsen Ofte
, Sokratis K. Katsikas
:
Paralyzed or Compromised: A Case Study of Decisions in Cyber-Physical Systems. 134-152 - Sandeep Pirbhulal, Sabarathinam Chockalingam
, Habtamu Abie
, Nathan Lau:
Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications. 153-163 - Noëlle Rakotondravony, Henrich C. Pöhls, Jan Pfeifer, Lane Harrison:
Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks. 164-185 - Shogo Sekiguchi, Shingo Kato, Yoshiki Nishikawa, Buntarou Shizuki:
Authentication Method Using Opening Gestures. 186-203 - Jeremiah D. Still, Thomas Morris, Morgan E. Edwards:
Investigating University QR Code Interactions. 204-214 - Hala Strohmier
, Aaryan R. Londhe
, Chris A. Clark
, Ronit Pawar
, Brian Kram
:
Exploring ICS/SCADA Network Vulnerabilities. 215-233 - Takumi Takaiwa, Shinnosuke Nozaki, Kota Numada, Tsubasa Shibata, Sana Okumura, Soichi Takigawa, Tetsushi Ohki
, Masakatsu Nishigaki
:
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data. 234-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.