Multi-level Fuzzy system for usable-security assessment
暂无分享,去创建一个
Rajeev Kumar | Alka Agrawal | Mamdouh Alenezi | Suhel Ahmad Khan | R. A. Khan | S. A. Khan | Rajeev Kumar | R. Khan | A. Agrawal | Mamdouh Alenezi
[1] Luigi Lo Iacono,et al. Towards the Usability Evaluation of Security APIs , 2016, HAISA.
[2] Cheng-Ru Wu,et al. Integrating fuzzy theory and hierarchy concepts to evaluate software quality , 2008, Software Quality Journal.
[3] Gary McGraw. Software Assurence for Security , 1999, Computer.
[4] J. Buckley,et al. Fuzzy hierarchical analysis , 1999, FUZZ-IEEE'99. 1999 IEEE International Fuzzy Systems. Conference Proceedings (Cat. No.99CH36315).
[5] Mao-Jiun J. Wang,et al. Ranking fuzzy numbers with integral value , 1992 .
[6] T. Saaty,et al. The Analytic Hierarchy Process , 1985 .
[7] Scott Ruoti,et al. Authentication Melee: A Usability Analysis of Seven Web Authentication Systems , 2015, WWW.
[8] Doowon Kim,et al. Balancing Security and Usability in Encrypted Email , 2017, IEEE Internet Computing.
[9] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[10] Pam J. Mayhew,et al. Security and usability of authenticating process of online banking: User experience study , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).
[11] Majed Alshamari,et al. A Review of Gaps between Usability and Security/Privacy , 2016 .
[12] Ahmed Seffah,et al. A Methodology for Aligning Usability and Security in Systems and Services , 2018, 2018 3rd International Conference on Information Systems Engineering (ICISE).
[13] Ivan Flechais,et al. Designing Secure and Usable Systems , 2005 .
[14] Yasser M. Hausawi. Towards a Usable-Security Engineering Framework for Enhancing Software Development , 2015 .
[15] Jim Basney,et al. Mechanisms for increasing the usability of grid security , 2005, Int. J. Hum. Comput. Stud..
[16] Hannan Xiao,et al. A study into the usability and security implications of text and image based challenge questions in the context of online examination , 2018, Education and Information Technologies.
[17] R. A. Khan,et al. Securo-Phobia: A New Challenge to Usage of Security Technologies , 2014 .
[18] Hepu Deng,et al. Multicriteria analysis with fuzzy pairwise comparison , 1999, FUZZ-IEEE'99. 1999 IEEE International Fuzzy Systems. Conference Proceedings (Cat. No.99CH36315).
[19] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.