NOTCH 发表于 2025-3-25 06:11:12
Principles of Persuasion in Social Engineering and Their Use in Phishingcuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psychological triggers, and Stajano . principles of scams. It is unclear whether these relate but clearly soSpartan 发表于 2025-3-25 10:49:15
http://reply.papertrans.cn/43/4290/428974/428974_22.pngDistribution 发表于 2025-3-25 13:33:01
Effects of Password Permutation on Subjective Usability Across Platformso the password requirements found in higher-security enterprise environments. This research builds upon a series of studies at the National Institute of Standards and Technology by testing a previously proposed idea of password permutation: grouping like character classes together in order to improv不能约 发表于 2025-3-25 18:42:09
http://reply.papertrans.cn/43/4290/428974/428974_24.pngcollateral 发表于 2025-3-25 20:37:32
http://reply.papertrans.cn/43/4290/428974/428974_25.png擦试不掉 发表于 2025-3-26 00:09:26
http://reply.papertrans.cn/43/4290/428974/428974_26.pngineptitude 发表于 2025-3-26 06:13:40
http://reply.papertrans.cn/43/4290/428974/428974_27.pngLucubrate 发表于 2025-3-26 09:13:33
http://reply.papertrans.cn/43/4290/428974/428974_28.png暴发户 发表于 2025-3-26 16:27:20
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication in the context of remote online learning. The logistical challenges and absence of live invigilation in remote un-supervised online examination makes the identification and authentication process extremely difficult. The authors implemented pre-defined text-based challenge questions for student aut易达到 发表于 2025-3-26 17:57:55
http://reply.papertrans.cn/43/4290/428974/428974_30.png