Research Directions in Authentication and Personal Data

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Human Factors in Cybersecurity (2016 : Florida) Advances in human factors in cybersecurity
1. Verfasser: Richards, Kirsten E. (VerfasserIn)
Weitere Verfasser: Norcio, Anthony F. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2016
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Users? Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability 2016 Lamb, Karen
Role of Intrusion-Detection Systems in Cyber-Attack Detection 2016 Dutt, Varun
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks 2016 Beitzel, Steve
Human Factor of Online Social Media Cybersecurity Risk Impact on Critical National Information Infrastructure 2016 Khidzir, Nik Zulkarnaen
Influence of Motivational Factors on Hackers’ and Analysts’ Decisions in Dynamic Security Games 2016 Maqbool, Zahid
Swipe Authentication: Exploring Over-the-Shoulder Attack Performance 2016 Cain, Ashley A.
Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) 2016 Funke, Gregory
Information Security Application Design: Improving Signal-to-Noise Ratio 2016 Dutta, Saurabh
Extended Password Security via Cloud: CloudPass 2016 Eich, James
Cyber-Security: Role of Deception in Cyber-Attack Detection 2016 Aggarwal, Palvi
Integrating Cultural Factors into Human Factors Framework and Ontology for Cyber Attackers 2016 Henshel, Diane
Cybersecurity Awareness in the Power Grid 2016 Scholtz, Jean
Investigating the Relationship Between Need for Cognition and Skill in Ethical Hackers 2016 Blanc, Katya Le
Developing an Insider Threat Training Environment 2016 Ortiz, Eric
Research Directions in Authentication and Personal Data 2016 Richards, Kirsten E.
Malware Detection Based on New Implementations of the Moody-Darken Single-Layer Perceptron Architecture: When the Data Speak, Are We Listening? 2016 Drake, Barry
Assessing Aptitude and Talent for Cyber Operations 2016 Saner, Lelyn D.
A Rapid Serial Visual Presentation Method for Graphical Authentication 2016 Cain, Ashley A.
Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context 2016 Senanayake, Rukman
Biometric-Based Cybersecurity Techniques 2016 Griffin, Phillip H.
Alle Artikel auflisten