Abstract is missing.
- Cybersecurity Management Through Logging AnalyticsMichael Muggler, Rekha Eshwarappa, Ebru Celikel Cankaya. 3-15 [doi]
- Adaptive Weak Secrets for Authenticated Key ExchangePhillip H. Griffin. 16-25 [doi]
- Internet of Things and Distributed Denial of Service MitigationMohammed AlSaudi Ali, Dyaa Motawa, Fahad Al-Harby. 26-36 [doi]
- Eye Tracking Graphical PasswordsMartin Mihajlov, Borka Jerman-Blazic. 37-44 [doi]
- Understanding and Discovering SQL Injection VulnerabilitiesAbdullaziz A. Sarhan, Shehab A. Farhan, Fahad M. Al-Harby. 45-51 [doi]
- Grid Framework to Address Password Memorability Issues and Offline Password AttacksPaul Biocco, Mohd Anwar. 52-61 [doi]
- Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart CardsChunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won. 62-71 [doi]
- Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable SecurityJongho Moon, Taeui Song, Donghoon Lee 0007, Youngsook Lee, Dongho Won. 72-77 [doi]
- Cryptanalysis of Lightweight User Authentication Scheme Using SmartcardDongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won. 78-84 [doi]
- Modeling, Analysis and Control of Personal Data to Ensure Data Privacy - A Use Case Driven ApproachChristian Zinke, Jürgen Anke, Kyrill Meyer, Johannes Schmidt 0003. 87-96 [doi]
- Exploring the Discoverability of Personal Data Used for AuthenticationKirsten E. Richards, Anthony F. Norcio. 97-105 [doi]
- Human Centric Security and Privacy for the IoT Using Formal TechniquesFlorian Kammüller. 106-116 [doi]
- Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security VisualizationsLauren Massey, Remzi Seker, Denise Nicholson. 117-129 [doi]
- Interacting with Synthetic Teammates in CyberspaceScott D. Lathrop. 133-145 [doi]
- Valuing Information Security from a Phishing AttackKenneth D. Nguyen, Heather Rosoff, Richard S. John. 146-157 [doi]
- Event Detection Based on Nonnegative Matrix Factorization: Ceasefire Violation, Environmental, and Malware EventsBarry L. Drake, Tiffany Huang, Ashley Beavers, Rundong Du, Haesun Park. 158-169 [doi]
- Human Behavior Analytics from Microworlds: The Cyber Security GameJohan de Heer, Paul Porskamp. 173-184 [doi]
- Culture + Cyber: Exploring the RelationshipChar Sample, Jennifer Cowley, Steve Hutchinson, Jonathan Z. Bakdash. 185-196 [doi]
- Exploring 3D Cybersecurity Visualization with the Microsoft HoloLensSteve Beitzel, Josiah Dykstra, Paul Toliver, Jason Youzwak. 197-207 [doi]
- Humans as the Strong Link in Securing the Total Learning ArchitectureFernando Maymí, Angela Woods, Jeremiah T. Folsom-Kovarik. 211-223 [doi]
- A Team-Level Perspective of Human Factors in Cyber Security: Security Operations CentersBalázs Péter Hámornik, Csaba Krasznay. 224-236 [doi]
- Utilizing Chatbots to Increase the Efficacy of Information Security PractitionersSaurabh Dutta, Ger Joyce, Jay Brewer. 237-243 [doi]
- Understanding Human Factors in Cyber Security as a Dynamic SystemHeather Young, Tony van Vliet, Josine van de Ven, Steven Jol, Carlijn Broekman. 244-254 [doi]
- Preserving Dignity, Maintaining Security and Acting EthicallyScott Cadzow. 257-268 [doi]
- Human Factors in Information Security Culture: A Literature ReviewHenry W. Glaspie, Waldemar Karwowski. 269-280 [doi]
- The Gender Turing TestWayne Patterson, Jacari Boboye, Sidney Hall, Maalik Hornbuckle. 281-289 [doi]
- Do You Really Trust "Privacy Policy" or "Terms of Use" Agreements Without Reading Them?Abbas Moallem. 290-295 [doi]
- Users' Attitudes Towards the "Going Dark" DebateAseel Addawood, Yixin Zou, Masooda N. Bashir. 296-307 [doi]
- Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational SettingsTihomir Orehovacki, Snjezana Babic, Darko Etinger. 308-320 [doi]