Advances in human factors in cybersecurity : AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
Bibliographische Detailangaben
- Titel
- Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
- verantwortlich
- ; ; ; ;
- Schriftenreihe
- Advances in Intelligent Systems and Computing ; ; v. 1219
- veröffentlicht
- Erscheinungsjahr
- 2020
- Teil von
- Advances in intelligent systems and computing ; ; 1219.
- Medientyp
- E-Book
- Datenquelle
- British National Bibliography
- Tags
- Tag hinzufügen
Zugang
Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.
- Details Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
- Standorte Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
- Inhaltsangabe Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
- Internformat Klicken Sie hier, um den Inhalt der Registerkarte zu laden.
Inhaltsangabe:
- Intro
- Advances in Human Factors and Ergonomics 2020
- Preface
- Contents
- Cognitive Factors, Personality and Decisions Making
- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering
- 1 Introduction
- 2 Past Research
- 3 Method and Materials
- 4 Results and Discussion
- References
- Cyberbullying Perceptions and Experiences in Diverse Youth
- 1 Introduction
- 2 Background and Related Work
- 3 Self-disclosure and Cyberbullying Behavior
- 4 Focus Group with LGBTQ+ Youths
- 5 Conclusions and Future Work
- References
- Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat
- 1 Introduction
- 2 Evolution of Ransomware
- 3 Methodology
- 4 Results
- 4.1 Impacts of Ransomware Infection
- 5 Outlawing Ransom Payments
- 6 Conclusion
- References
- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems?
- 1 Introduction
- 2 Research Background
- 3 Previous Findings
- 4 Method
- 5 Results
- 6 Discussion
- 7 Final Considerations
- References
- The Impact of Fake News on the African-American Community
- 1 Introduction
- 2 The Impact of Fake News on African-American Voters
- 3 Research Design
- 4 Analysis of Results of F-R-S Choice
- 5 Analysis of Study of "Impressions"
- 6 Conclusions
- References
- Cybersecurity Tools and Analytics
- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics
- 1 Introduction
- 2 Dataset
- 3 Methods
- 3.1 Feature Extraction
- 3.2 Learning Algorithms
- 3.3 Models Evaluation
- 4 Results and Discussion
- References
- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited
- 1 Introduction
- 2 Background
- 3 Methodology
- 3.1 Data Collection
- 3.2 Coding Strategy
- 4 Results
- 5 Discussion
- References
- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks
- 1 Introduction
- 2 Materials and Methods
- 2.1 Materials
- 2.2 Methods
- 3 Model for Classification of Academic Information
- 3.1 Preprocessing
- 3.2 Model Development with GANN-C
- 4 Results
- 5 Conclusions and Future Works
- References
- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform
- 1 Introduction
- 2 Method
- 2.1 Experimental Design
- 2.2 Data Processing
- 3 Results
- 4 Discussion and Conclusion
- References
- Awareness, Training and Education
- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center
- 1 Introduction
- 2 Defining Tactical Situational Awareness in Cybersecurity
- 2.1 Methods
- 2.2 Results
- 3 Evaluating a Prototype Situational Awareness Capability
- 3.1 Concept and Design
- 3.2 Methods
- 3.3 Results
- 4 Discussion
- References
- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal
- 1 Introduction