Users? Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability
|
2016 |
Lamb, Karen |
Role of Intrusion-Detection Systems in Cyber-Attack Detection
|
2016 |
Dutt, Varun |
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks
|
2016 |
Beitzel, Steve |
Human Factor of Online Social Media Cybersecurity Risk Impact on Critical National Information Infrastructure
|
2016 |
Khidzir, Nik Zulkarnaen |
Influence of Motivational Factors on Hackers’ and Analysts’ Decisions in Dynamic Security Games
|
2016 |
Maqbool, Zahid |
Swipe Authentication: Exploring Over-the-Shoulder Attack Performance
|
2016 |
Cain, Ashley A. |
Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)
|
2016 |
Funke, Gregory |
Information Security Application Design: Improving Signal-to-Noise Ratio
|
2016 |
Dutta, Saurabh |
Extended Password Security via Cloud: CloudPass
|
2016 |
Eich, James |
Cyber-Security: Role of Deception in Cyber-Attack Detection
|
2016 |
Aggarwal, Palvi |
Integrating Cultural Factors into Human Factors Framework and Ontology for Cyber Attackers
|
2016 |
Henshel, Diane |
Cybersecurity Awareness in the Power Grid
|
2016 |
Scholtz, Jean |
Investigating the Relationship Between Need for Cognition and Skill in Ethical Hackers
|
2016 |
Blanc, Katya Le |
Developing an Insider Threat Training Environment
|
2016 |
Ortiz, Eric |
Research Directions in Authentication and Personal Data
|
2016 |
Richards, Kirsten E. |
Malware Detection Based on New Implementations of the Moody-Darken Single-Layer Perceptron Architecture: When the Data Speak, Are We Listening?
|
2016 |
Drake, Barry |
Assessing Aptitude and Talent for Cyber Operations
|
2016 |
Saner, Lelyn D. |
A Rapid Serial Visual Presentation Method for Graphical Authentication
|
2016 |
Cain, Ashley A. |
Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context
|
2016 |
Senanayake, Rukman |
Biometric-Based Cybersecurity Techniques
|
2016 |
Griffin, Phillip H. |