找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Human Aspects of Information Security and Assurance; 15th IFIP WG 11.12 I Steven Furnell,Nathan Clarke Conference proceedings 2021 IFIP Int

[复制链接]
楼主: GURU
发表于 2025-3-25 06:56:44 | 显示全部楼层
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Educationengage students with content and can complement more traditional approaches to learning. This article proposes SherLOCKED, a new serious game created in the style of a 2D top-down puzzle adventure. The game is situated in the context of an undergraduate cyber security course, and is used to consolid
发表于 2025-3-25 10:40:10 | 显示全部楼层
发表于 2025-3-25 13:36:22 | 显示全部楼层
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schoolsecurity policy is contextually dependent and there is no agreement on what organisations should include in their security policies. This paper argues that analysing information security policy documents could potentially provide new insights into existing issues with security practices. The paper ex
发表于 2025-3-25 18:37:19 | 显示全部楼层
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Childrenly with the result that cell phones, tablets and similar devices are more accessible to both young and old. Technological advancements create many opportunities, however it also exposes its users to many threats. Pre-school children are especially vulnerable to these threats, as they are rarely made
发表于 2025-3-25 19:59:38 | 显示全部楼层
发表于 2025-3-26 00:30:27 | 显示全部楼层
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devicesndamental means of ensuring safe use. Given the paucity of information provided with many devices at the time of purchase, this paper engages in a critical study of the type of advice that home Internet of Things (IoT) or smart device users might be presented with on the Internet to inform their cyb
发表于 2025-3-26 05:13:26 | 显示全部楼层
Making Access Control Easy in IoTiguration Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task Force (IETF) to automate the protection of IoT devices by micro-segmentation using dynamic access control lists. The protocol defines a conceptually straightforward method to implement access control upon
发表于 2025-3-26 09:43:23 | 显示全部楼层
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigationological advances and the cyber threat landscape. This outcome highlighted once more the cybersecurity skills shortage and the necessity to address this gap. A solution to this, is to consider a multidisciplinary cybersecurity workforce with professionals originating from different backgrounds, beyo
发表于 2025-3-26 14:42:09 | 显示全部楼层
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishinghe convenient use of a mobile phone. At the same time, criminals are able to utilise this technology to their own benefit, such as by sending phishing messages that convince their victims into sharing sensitive information or installing dangerous software on their devices. Indeed, Proofpoint’s State
发表于 2025-3-26 19:48:56 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 04:11
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表