Cognitive Performance Impact of Augmented Reality for Network Operations Tasks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Human Factors in Cybersecurity (2016 : Florida) Advances in human factors in cybersecurity
1. Verfasser: Beitzel, Steve (VerfasserIn)
Weitere Verfasser: Dykstra, Josiah (VerfasserIn), Huver, Sean (VerfasserIn), Kaplan, Michael (VerfasserIn), Loushine, Michael (VerfasserIn), Youzwak, Jason (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2016
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Cyber Operator Perspectives on Security Visualization 2016 D'Amico, Anita
Stress and Workload Profiles of Network Analysis: Not All Tasks Are Created Equal 2016 Greenlee, Eric T.
The Importance of Information Security Awareness for the Success of Business Enterprises 2016 Yildirim, Ebru
Contextualizing Mnemonic Phrase Passwords 2016 McEvoy, Pete
“Is This Cyberbullying or Not?”: Intertwining Computational Detection with Human Perception (A Case Study) 2016 Dillon, Edward
A Rapid Serial Visual Presentation Method for Graphical Authentication 2016 Cain, Ashley A.
Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context 2016 Senanayake, Rukman
Biometric-Based Cybersecurity Techniques 2016 Griffin, Phillip H.
Understanding the Personality Characteristics of Cybersecurity Competition Participants to Improve the Effectiveness of Competitions as Recruitment Tools 2016 Wee, Colin
Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure 2016 Ani, Uchenna P. Daniel
A White Hat Approach to Identifying Gaps Between Cybersecurity Education and Training: A Social Engineering Case Study 2016 Young-McLear, Kimberly
Behavioral Cybersecurity: Human Factors in the Cybersecurity Curriculum 2016 Patterson, Wayne
Applying Human Factors Research Towards Cyberspace Operations: A Practitioner's Perspective 2016 Lathrop, Scott D.
Multi-cultural Empirical Study of Password Strength Versus Ergonomic Utility 2016 Hancock, Monte
Increasing Software Security by Using Mental Models 2016 Märki, Heike
Cyber Epidemics: Modeling Attacker-Defender Dynamics in Critical Infrastructure Systems 2016 Canzani, Elisa
Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats 2016 Lee-Urban, Stephen
Intelligent Agent Representations of Malware: Analysis to Prepare for Future Cyber Threats 2016 Whitaker, Elizabeth
Computer Programming as a Second Language 2016 Pandža, Nick B.
Information Security Application Design: Improving Signal-to-Noise Ratio 2016 Dutta, Saurabh
Alle Artikel auflisten