Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
View More Papers
A Comparison of Three Approaches to Assist Users in...
Michael Clark (Brigham Young University), Scott Ruoti (The University of Tennessee), Michael Mendoza (Imperial College London), Kent Seamons (Brigham Young University)
Read MoreVision: “AccessFormer”: Feedback-Driven Access Control Policy
Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello (University of Auckland)
Read MoreOn-demand RFID: Improving Privacy, Security, and User Trust in...
Youngwook Do (JPMorganChase and Georgia Institute of Technology), Tingyu Cheng (Georgia Institute of Technology and University of Notre Dame), Yuxi Wu (Georgia Institute of Technology and Northeastern University), HyunJoo Oh(Georgia Institute of Technology), Daniel J. Wilson (Northeastern University), Gregory D. Abowd (Northeastern University), Sauvik Das (Carnegie Mellon University)
Read MoreCybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges...
Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
Read More