A Human Factor Approach to Threat Modeling
暂无分享,去创建一个
[1] Danny Dhillon,et al. Developer-Driven Threat Modeling: Lessons Learned in the Trenches , 2011, IEEE Security & Privacy.
[2] Pilsung Choe,et al. A Framework of Information Security Integrated with Human Factors , 2019, HCI.
[3] Nico Martins,et al. Information security culture and information protection culture: A validated assessment instrument , 2015, Comput. Law Secur. Rev..
[4] Rosa Lanzilotti,et al. Alerting Users About Phishing Attacks , 2019, HCI.
[5] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[6] Elmarie Kritzinger,et al. Theoretical Domain Framework to Identify Cybersecurity Behaviour Constructs , 2019, ICITL.
[7] Wouter Joosen,et al. A descriptive study of Microsoft’s threat modeling technique , 2015, Requirements Engineering.
[8] Dianxiang Xu,et al. A threat model‐based approach to security testing , 2013, Softw. Pract. Exp..
[9] Punam Bedi,et al. Threat‐oriented security framework in risk management using multiagent system , 2013, Softw. Pract. Exp..
[10] Robert Lagerström,et al. Threat modeling - A systematic literature review , 2019, Comput. Secur..
[11] James Purnama,et al. Enhancing Honeypot Deception Capability Through Network Service Fingerprinting , 2017 .
[12] Tony Ucedavélez,et al. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis , 2015 .
[13] Pascale Carayon,et al. Human and organizational factors in computer and information security: Pathways to vulnerabilities , 2009, Comput. Secur..
[14] Ken H. Guo. Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..
[15] Josine G. M. van de Ven,et al. Understanding human factors in cyber security as a dynamic system , 2017 .
[16] Waldemar Karwowski,et al. Human Factors in Information Security Culture: A Literature Review , 2017, AHFE.
[17] Arvind Mallari Rao,et al. Technical Aspects of Cyber Kill Chain , 2015, SSCC.
[18] Eduardo B. Fernández,et al. An extensible pattern-based library and taxonomy of security threats for distributed systems , 2014, Comput. Stand. Interfaces.
[19] Grayson Kemper. Improving employees' cyber security awareness , 2019 .
[20] Lauren S. Ferro,et al. Another Week at the Office (AWATO) - An Interactive Serious Game for Threat Modeling Human Factors , 2020, HCI.
[21] Özlem Müge Testik,et al. Analysis of personal information security behavior and awareness , 2016, Comput. Secur..
[22] S. Brace,et al. Human factors and error prevention in emergency medicine , 2011, Emergency Medicine Journal.
[23] Fatemeh Zahedi,et al. Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..