Enhancing security behaviour by supporting the user (Englisch)
- Neue Suche nach: Furnell, Steven
- Neue Suche nach: Khern-am-nuai, Warut
- Neue Suche nach: Esmael, Rawan
- Neue Suche nach: Yang, Weining
- Neue Suche nach: Li, Ninghui
- Neue Suche nach: Furnell, Steven
- Neue Suche nach: Khern-am-nuai, Warut
- Neue Suche nach: Esmael, Rawan
- Neue Suche nach: Yang, Weining
- Neue Suche nach: Li, Ninghui
In:
Computers & security
;
75
;
1-9
;
2018
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Enhancing security behaviour by supporting the user
-
Beteiligte:Furnell, Steven ( Autor:in ) / Khern-am-nuai, Warut ( Autor:in ) / Esmael, Rawan ( Autor:in ) / Yang, Weining ( Autor:in ) / Li, Ninghui ( Autor:in )
-
Erschienen in:Computers & security ; 75 ; 1-9
-
Verlag:
- Neue Suche nach: Elsevier Science B.V., Amsterdam.
-
Erscheinungsdatum:01.01.2018
-
Format / Umfang:9 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.805
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.805 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 75
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Enhancing security behaviour by supporting the userFurnell, Steven / Khern-am-nuai, Warut / Esmael, Rawan / Yang, Weining / Li, Ninghui et al. | 2018
- 10
-
Identifying 3D printer residual data via open-source documentationMiller, Daniel Bradford / Glisson, William Bradley / Yampolskiy, Mark / Choo, Kim-Kwang Raymond et al. | 2018
- 24
-
Cybersecurity education: Evolution of the discipline and analysis of master programsCabaj, Krzysztof / Domingos, Dulce / Kotulski, Zbigniew / Respício, Ana et al. | 2018
- 36
-
A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detectionChiba, Zouhair / Abghour, Noureddine / Moussaid, Khalid / El Omri, Amina / Rida, Mohamed et al. | 2018
- 59
-
A broker-based framework for standardization and management of Cloud Security-SLAsHalabi, Talal / Bellaiche, Martine et al. | 2018
- 72
-
A cost-sensitive move selection strategy for moving target defenseZangeneh, Vahid / Shajari, Mehdi et al. | 2018
- 92
-
If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScriptSayed, Bassam / Traoré, Issa / Abdelhalim, Amany et al. | 2018
- 118
-
A systematic review of fuzzing techniquesChen, Chen / Cui, Baojiang / Ma, Jinxin / Wu, Runpu / Guo, Jianchao / Liu, Wenqian et al. | 2018
- 138
-
One-time password based on hash chain without shared secret and re-registrationPark, Chang-Seop et al. | 2018
- 147
-
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examinationMenard, Philip / Warkentin, Merrill / Lowry, Paul Benjamin et al. | 2018
- 167
-
FNF: Flow-net based fingerprinting and its applicationsFu, Bo / Xiao, Yang / Chen, Hui et al. | 2018
- 182
-
Formally modeling deceptive patches using a game-based approachAvery, Jeffrey / Wallrabenstein, John Ross et al. | 2018
- 191
-
A security framework for mHealth apps on Android platformHussain, Muzammil / Al-Haiqi, Ahmed / Zaidan, A.A. / Zaidan, B.B. / Kiah, M. / Iqbal, Salman / Iqbal, S. / Abdulnabi, Mohamed et al. | 2018
-
Editorial Board| 2018