JEER 发表于 2025-3-26 22:42:38
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivatior. We draw on Protection Motivation Theory (PMT) to uncover indirect influences of ISA programs, and seek to identify the extent to which intention translates into actual compliance is contingent on monitoring. Based on partial least squares structural equation modeling analysis of 183 survey respoLoathe 发表于 2025-3-27 03:06:26
Analysis of Human Awareness of Security and Privacy Threats in Smart Environmentsty of life, energy efficiency and economical sustainability. In this perspective, the individual has a core role and so has networking, which enables such entities to cooperate. However, the huge amount of sensitive data, social aspects and the mixed set of protocols offer many opportunities to injeHeresy 发表于 2025-3-27 07:33:04
A Probabilistic Analysis Framework for Malicious Insider Threatsthem to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework first identifies insiders’ intention to perform an insikeloid 发表于 2025-3-27 09:36:03
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environmentll as to train users in isolated and controlled environment. Particularly, the paper focuses on the user environment and visualizations, providing views and interactions improving the understanding of processes emerged during experiments. Web user interface of the KYPO system supports several collab600 发表于 2025-3-27 15:14:04
Luca Caviglione,Jean-François Lalande,Wojciech Mazurczyk,Steffen Wendzelwaren es vor allem die Fortschritte der Festkörper- und Halbleiterphysik, die diese Entwicklung vorantrieben. Während in den fünfziger Jahren die Schaltungstechnik in zunehmendem Maße den übergang von Röhren- zu Transistorschaltungen vollzog, wurde in den sechziger Jahren als weiterer Fortschritt deEclampsia 发表于 2025-3-27 20:17:07
http://reply.papertrans.cn/43/4290/428974/428974_36.png香料 发表于 2025-3-28 01:52:50
Conference proceedings 2015ld as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address暂时休息 发表于 2025-3-28 05:49:11
0302-9743Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a caref组装 发表于 2025-3-28 07:29:11
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objectsones judged by common sense, cause a feeling of strangeness. Usability survey suggests that the correct response rate is 90.5 % and the average response time is about 5.7 s. In addition, the CAPTCHA system is able to generate questions countlessly and easily by using 3DCG technologies. We also describe threats to its security.打击 发表于 2025-3-28 12:37:33
http://reply.papertrans.cn/43/4290/428974/428974_40.png