我不怕牺牲 发表于 2025-3-28 15:49:14
http://reply.papertrans.cn/43/4202/420130/420130_41.pngBUDGE 发表于 2025-3-28 22:03:39
Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectatis. The findings from our study unpacked the contexts of availing intermediate help with using devices and accounts, where we identified the corresponding challenges, concerns, and the security and privacy risks of users.建筑师 发表于 2025-3-28 23:44:42
Securing Software Defining Network from Emerging DDoS Attackate a threat information database that will use as a reference for further investigation..Finally, the proposed solution does not consider all types of DDoS attacks and AI/Machine learning detection solutions for attack detection and mitigation.pacifist 发表于 2025-3-29 04:42:45
http://reply.papertrans.cn/43/4202/420130/420130_44.pngepinephrine 发表于 2025-3-29 09:49:44
A Survey of User Experience in Usable Security and Privacy Researcher-focused security research. We found that a user’s misunderstanding of technology is central to risky decision-making. Our study highlights trends in the research community and remaining work. This paper contributes to this discussion by generalizing key themes across user experience in usable security and privacy.哑剧 发表于 2025-3-29 14:29:50
http://reply.papertrans.cn/43/4202/420130/420130_46.png大吃大喝 发表于 2025-3-29 19:28:39
http://reply.papertrans.cn/43/4202/420130/420130_47.pngIngratiate 发表于 2025-3-29 21:45:36
http://reply.papertrans.cn/43/4202/420130/420130_48.png愚笨 发表于 2025-3-30 03:36:03
Lessons Learned and Suitability of Focus Groups in Security Information Workers Researchis paper documents lessons learned and the suitability of using focus groups to study SIW. We also suggest ways to alleviate concerns SIW may have with focus group participation. These insights may be helpful to other researchers embarking on SIW research.manifestation 发表于 2025-3-30 04:44:11
Conference proceedings 2022user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurity