NOTCH
发表于 2025-3-25 06:11:12
Principles of Persuasion in Social Engineering and Their Use in Phishingcuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psychological triggers, and Stajano . principles of scams. It is unclear whether these relate but clearly so
Spartan
发表于 2025-3-25 10:49:15
http://reply.papertrans.cn/43/4290/428974/428974_22.png
Distribution
发表于 2025-3-25 13:33:01
Effects of Password Permutation on Subjective Usability Across Platformso the password requirements found in higher-security enterprise environments. This research builds upon a series of studies at the National Institute of Standards and Technology by testing a previously proposed idea of password permutation: grouping like character classes together in order to improv
不能约
发表于 2025-3-25 18:42:09
http://reply.papertrans.cn/43/4290/428974/428974_24.png
collateral
发表于 2025-3-25 20:37:32
http://reply.papertrans.cn/43/4290/428974/428974_25.png
擦试不掉
发表于 2025-3-26 00:09:26
http://reply.papertrans.cn/43/4290/428974/428974_26.png
ineptitude
发表于 2025-3-26 06:13:40
http://reply.papertrans.cn/43/4290/428974/428974_27.png
Lucubrate
发表于 2025-3-26 09:13:33
http://reply.papertrans.cn/43/4290/428974/428974_28.png
暴发户
发表于 2025-3-26 16:27:20
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication in the context of remote online learning. The logistical challenges and absence of live invigilation in remote un-supervised online examination makes the identification and authentication process extremely difficult. The authors implemented pre-defined text-based challenge questions for student aut
易达到
发表于 2025-3-26 17:57:55
http://reply.papertrans.cn/43/4290/428974/428974_30.png