Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)
Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change
View More Papers
Explainable AI in Cybersecurity Operations: Lessons Learned from xAI...
Megan Nyre-Yu (Sandia National Laboratories), Elizabeth S. Morris (Sandia National Laboratories), Blake Moss (Sandia National Laboratories), Charles Smutz (Sandia National Laboratories), Michael R. Smith (Sandia National Laboratories)
Read MoreAnalyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreA Phish Scale: Rating Human Phishing Message Detection Difficulty
Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
Read More