Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
View More Papers
Vision: “AccessFormer”: Feedback-Driven Access Control Policy
Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello (University of Auckland)
Read MoreAnalyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreTowards Integrating Human-Centered Cybersecurity Research Into Practice: A Practitioner...
Julie Haney, Clyburn Cunningham, Susanne Furman (National Institute of Standards and Technology)
Read MoreA Comparison of Three Approaches to Assist Users in...
Michael Clark (Brigham Young University), Scott Ruoti (The University of Tennessee), Michael Mendoza (Imperial College London), Kent Seamons (Brigham Young University)
Read More