default search action
AHFE 2017: Los Angeles, CA, USA
- Denise Nicholson:
Advances in Human Factors in Cybersecurity - Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA. Advances in Intelligent Systems and Computing 593, Springer 2018, ISBN 978-3-319-60584-5
Cybersecurity Tools and Analytics
- Michael Muggler, Rekha Eshwarappa, Ebru Celikel Cankaya:
Cybersecurity Management Through Logging Analytics. 3-15 - Phillip H. Griffin:
Adaptive Weak Secrets for Authenticated Key Exchange. 16-25 - Mohammed AlSaudi Ali, Dyaa Motawa, Fahad M. Al-Harby:
Internet of Things and Distributed Denial of Service Mitigation. 26-36 - Martin Mihajlov, Borka Jerman-Blazic:
Eye Tracking Graphical Passwords. 37-44 - Abdullaziz A. Sarhan, Shehab A. Farhan, Fahad M. Al-Harby:
Understanding and Discovering SQL Injection Vulnerabilities. 45-51 - Paul Biocco, Mohd Anwar:
Grid Framework to Address Password Memorability Issues and Offline Password Attacks. 52-61 - Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won:
Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards. 62-71 - Jongho Moon, Taeui Song, Donghoon Lee, Youngsook Lee, Dongho Won:
Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security. 72-77 - Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won:
Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. 78-84
Cybersecurity Interface and Metrics
- Christian Zinke, Jürgen Anke, Kyrill Meyer, Johannes Schmidt:
Modeling, Analysis and Control of Personal Data to Ensure Data Privacy - A Use Case Driven Approach. 87-96 - Kirsten E. Richards, Anthony F. Norcio:
Exploring the Discoverability of Personal Data Used for Authentication. 97-105 - Florian Kammüller:
Human Centric Security and Privacy for the IoT Using Formal Techniques. 106-116 - Lauren Massey, Remzi Seker, Denise Nicholson:
Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations. 117-129
Human Factors in Cyber-Warfare
- Scott D. Lathrop:
Interacting with Synthetic Teammates in Cyberspace. 133-145 - Kenneth D. Nguyen, Heather Rosoff, Richard S. John:
Valuing Information Security from a Phishing Attack. 146-157 - Barry L. Drake, Tiffany Huang, Ashley Beavers, Rundong Du, Haesun Park:
Event Detection Based on Nonnegative Matrix Factorization: Ceasefire Violation, Environmental, and Malware Events. 158-169
Human Dimension and Visualization for Cybersecurity
- Johan de Heer, Paul Porskamp:
Human Behavior Analytics from Microworlds: The Cyber Security Game. 173-184 - Char Sample, Jennifer Cowley, Steve E. Hutchinson, Jonathan Z. Bakdash:
Culture + Cyber: Exploring the Relationship. 185-196 - Steve Beitzel, Josiah Dykstra, Paul Toliver, Jason Youzwak:
Exploring 3D Cybersecurity Visualization with the Microsoft HoloLens. 197-207
Cybersecurity Training and Education
- Fernando Maymí, Angela Woods, Jeremiah T. Folsom-Kovarik:
Humans as the Strong Link in Securing the Total Learning Architecture. 211-223 - Balázs Péter Hámornik, Csaba Krasznay:
A Team-Level Perspective of Human Factors in Cyber Security: Security Operations Centers. 224-236 - Saurabh Dutta, Ger Joyce, Jay Brewer:
Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners. 237-243 - Heather Young, Tony van Vliet, Josine G. M. van de Ven, Steven Jol, Carlijn Broekman:
Understanding Human Factors in Cyber Security as a Dynamic System. 244-254
Privacy and Cultural Factors in Cybersecurity
- Scott Cadzow:
Preserving Dignity, Maintaining Security and Acting Ethically. 257-268 - Henry W. Glaspie, Waldemar Karwowski:
Human Factors in Information Security Culture: A Literature Review. 269-280 - Wayne Patterson, Jacari Boboye, Sidney Hall, Maalik Hornbuckle:
The Gender Turing Test. 281-289 - Abbas Moallem:
Do You Really Trust "Privacy Policy" or "Terms of Use" Agreements Without Reading Them? 290-295 - Aseel Addawood, Yixin Zou, Masooda N. Bashir:
Users' Attitudes Towards the "Going Dark" Debate. 296-307 - Tihomir Orehovacki, Snjezana Babic, Darko Etinger:
Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings. 308-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.