|
Part I Cybersecurity Interface and Metrics |
|
|
|
A Rapid Serial Visual Presentation Method for Graphical Authentication |
|
|
3 | (10) |
|
|
|
Information Security Application Design: Improving Signal-to-Noise Ratio |
|
|
13 | (6) |
|
|
|
Towards More Effective Cyber Operator Interfaces Through Semantic Modeling of User Context |
|
|
19 | (14) |
|
|
|
Extended Password Security via Cloud: CloudPass |
|
|
33 | (10) |
|
|
|
|
|
Biometric-Based Cybersecurity Techniques |
|
|
43 | (12) |
|
|
Users' Privacy Perceptions About Wearable Technology: Examining Influence of Personality, Trust, and Usability |
|
|
55 | (14) |
|
|
|
|
|
Cyber Operator Perspectives on Security Visualization |
|
|
69 | (16) |
|
|
|
|
|
Part II Cybersecurity Behavior |
|
|
|
Cyber-Security: Role of Deception in Cyber-Attack Detection |
|
|
85 | (12) |
|
|
|
|
Role of Intrusion-Detection Systems in Cyber-Attack Detection |
|
|
97 | (14) |
|
|
|
|
Understanding the Personality Characteristics of Cybersecurity Competition Participants to Improve the Effectiveness of Competitions as Recruitment Tools |
|
|
111 | (12) |
|
|
|
Integrating Cultural Factors into Human Factors Framework and Ontology for Cyber Attackers |
|
|
123 | (16) |
|
|
|
|
|
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks |
|
|
139 | (14) |
|
|
|
|
|
|
|
Stress and Workload Profiles of Network Analysis: Not All Tasks Are Created Equal |
|
|
153 | (16) |
|
|
|
|
|
|
|
|
|
Part III Cybersecurity Situational Awareness for Critical Infrastructure |
|
|
|
Human Capability Evaluation Approach for Cyber Security in Critical Industrial Infrastructure |
|
|
169 | (14) |
|
|
|
|
Cybersecurity Awareness in the Power Grid |
|
|
183 | (12) |
|
|
|
|
|
Human Factor of Online Social Media Cybersecurity Risk Impact on Critical National Information Infrastructure |
|
|
195 | (16) |
|
|
|
|
Mohamad Shahfik Affendi Abdul Ghani |
|
|
|
|
Part IV Cybersecurity Training |
|
|
|
The Importance of Information Security Awareness for the Success of Business Enterprises |
|
|
211 | (12) |
|
|
Investigating the Relationship Between Need for Cognition and Skill in Ethical Hackers |
|
|
223 | (6) |
|
|
|
A White Hat Approach to Identifying Gaps Between Cybersecurity Education and Training: A Social Engineering Case Study |
|
|
229 | (10) |
|
|
|
|
|
Influence of Motivational Factors on Hackers' and Analysts' Decisions in Dynamic Security Games |
|
|
239 | (14) |
|
|
|
|
Behavioral Cybersecurity: Human Factors in the Cybersecurity Curriculum |
|
|
253 | (14) |
|
|
|
|
Developing an Insider Threat Training Environment |
|
|
267 | (14) |
|
|
|
|
Part V Cybersecurity Research for Human Effectiveness |
|
|
|
Applying Human Factors Research Towards Cyberspace Operations: A Practitioner's Perspective |
|
|
281 | (14) |
|
|
|
|
Contextualizing Mnemonic Phrase Passwords |
|
|
295 | (10) |
|
|
|
Research Directions in Authentication and Personal Data |
|
|
305 | (10) |
|
|
|
Part VI Cybersecurity---Personal Security |
|
|
|
Multi-cultural Empirical Study of Password Strength Versus Ergonomic Utility |
|
|
315 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Swipe Authentication: Exploring Over-the-Shoulder Attack Performance |
|
|
327 | (10) |
|
|
|
|
|
"Is This Cyberbullying or Not?": Intertwining Computational Detection with Human Perception (A Case Study) |
|
|
337 | (10) |
|
|
|
|
|
|
Increasing Software Security by Using Mental Models |
|
|
347 | (16) |
|
|
|
|
|
Part VII Cybersecurity Tools |
|
|
|
Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) |
|
|
363 | (14) |
|
|
|
|
|
|
|
|
|
|
Cyber Epidemics: Modeling Attacker-Defender Dynamics in Critical Infrastructure Systems |
|
|
377 | (14) |
|
|
|
Intelligent Agent Representations of Malware: Analysis to Prepare for Future Cyber Threats |
|
|
391 | (10) |
|
|
|
Two Complementary Network Modeling and Simulation Approaches to Aid in Understanding Advanced Cyber Threats |
|
|
401 | (14) |
|
|
|
|
|
Malware Detection Based on New Implementations of the Moody-Darken Single-Layer Perceptron Architecture: When the Data Speak, Are We Listening? |
|
|
415 | (16) |
|
|
|
|
Part VIII Cultural Factors in Cybersecurity |
|
|
|
Assessing Aptitude and Talent for Cyber Operations |
|
|
431 | (8) |
|
|
|
|
|
|
|
Computer Programming as a Second Language |
|
|
439 | |
|