Login

Nicholson, Denise

Advances in Human Factors in Cybersecurity

Nicholson, Denise - Advances in Human Factors in Cybersecurity, ebook

306,00€

Ebook, PDF with Adobe DRM
ISBN: 9783319605852
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Cybersecurity Management Through Logging Analytics
Michael Muggler, Rekha Eshwarappa, Ebru Celikel Cankaya

2. Adaptive Weak Secrets for Authenticated Key Exchange
Phillip H. Griffin

3. Internet of Things and Distributed Denial of Service Mitigation
Mohammed AlSaudi Ali, Dyaa Motawa, Fahad Al-Harby

4. Eye Tracking Graphical Passwords
Martin Mihajlov, Borka Jerman-Blazic

5. Understanding and Discovering SQL Injection Vulnerabilities
Abdullaziz A. Sarhan, Shehab A. Farhan, Fahad M. Al-Harby

6. Grid Framework to Address Password Memorability Issues and Offline Password Attacks
Paul Biocco, Mohd Anwar

7. Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards
Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won

8. Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security
Jongho Moon, Taeui Song, Donghoon Lee, Youngsook Lee, Dongho Won

9. Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard
Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won

10. Modeling, Analysis and Control of Personal Data to Ensure Data Privacy – A Use Case Driven Approach
Christian Zinke, Jürgen Anke, Kyrill Meyer, Johannes Schmidt

11. Exploring the Discoverability of Personal Data Used for Authentication
Kirsten E. Richards, Anthony F. Norcio

12. Human Centric Security and Privacy for the IoT Using Formal Techniques
Florian Kammüller

13. Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations
Lauren Massey, Remzi Seker, Denise Nicholson

14. Interacting with Synthetic Teammates in Cyberspace
Scott D. Lathrop

15. Valuing Information Security from a Phishing Attack
Kenneth D. Nguyen, Heather Rosoff, Richard S. John

16. Event Detection Based on Nonnegative Matrix Factorization: Ceasefire Violation, Environmental, and Malware Events
Barry Drake, Tiffany Huang, Ashley Beavers, Rundong Du, Haesun Park

17. Human Behavior Analytics from Microworlds: The Cyber Security Game
Johan Heer, Paul Porskamp

18. Culture + Cyber: Exploring the Relationship
Char Sample, Jennifer Cowley, Steve Hutchinson, Jonathan Bakdash

19. Exploring 3D Cybersecurity Visualization with the Microsoft HoloLens
Steve Beitzel, Josiah Dykstra, Paul Toliver, Jason Youzwak

20. Humans as the Strong Link in Securing the Total Learning Architecture
Fernando Maymí, Angela Woods, Jeremiah Folsom-Kovarik

21. A Team-Level Perspective of Human Factors in Cyber Security: Security Operations Centers
Balázs Péter Hámornik, Csaba Krasznay

22. Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners
Saurabh Dutta, Ger Joyce, Jay Brewer

23. Understanding Human Factors in Cyber Security as a Dynamic System
Heather Young, Tony Vliet, Josine Ven, Steven Jol, Carlijn Broekman

24. Preserving Dignity, Maintaining Security and Acting Ethically
Scott Cadzow

25. Human Factors in Information Security Culture: A Literature Review
Henry W. Glaspie, Waldemar Karwowski

26. The Gender Turing Test
Wayne Patterson, Jacari Boboye, Sidney Hall, Maalik Hornbuckle

27. Do You Really Trust “Privacy Policy” or “Terms of Use” Agreements Without Reading Them?
Abbas Moallem

28. Users’ Attitudes Towards the “Going Dark” Debate
Aseel Addawood, Yixin Zou, Masooda Bashir

29. Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings
Tihomir Orehovački, Snježana Babić, Darko Etinger

Keywords: Engineering, Computational Intelligence, Systems and Data Security, User Interfaces and Human Computer Interaction, Business IT Infrastructure, Cybercrime

Editor
Publisher
Springer
Publication year
2018
Language
en
Edition
1
Series
Advances in Intelligent Systems and Computing
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783319605852
Printed ISBN
978-3-319-60584-5

Similar titles