Contextual security awareness: A context-based approach for assessing the security awareness of users

[1]  Fei Long,et al.  Improved Personalized Recommendation Algorithm Based on Context-Aware in Mobile Computing Environment , 2020, Wirel. Commun. Mob. Comput..

[2]  Li Guo,et al.  Unveiling SSL/TLS MITM Hosts in the Wild , 2020, 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE).

[3]  Eliad Shem Tov,et al.  Evolving Context-Aware Recommender Systems With Users in Mind , 2020, Expert Syst. Appl..

[4]  Wafa Shafqat,et al.  A Context-Aware Location Recommendation System for Tourists Using Hierarchical LSTM Model , 2020, Sustainability.

[5]  Meenu,et al.  Phishing Website Detection Based on Machine Learning: A Survey , 2020, 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS).

[6]  John Waterworth,et al.  Predicting Personal Susceptibility to Phishing , 2020, ICITS.

[7]  Ali A. Ghorbani,et al.  Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.

[8]  Rami Puzis,et al.  Evaluating the Information Security Awareness of Smartphone Users , 2019, CHI.

[9]  Hussain Aldawood,et al.  Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues , 2019, Future Internet.

[10]  Navneet Goyal,et al.  A Comparison of Machine Learning Attributes for Detecting Malicious Websites , 2019, 2019 11th International Conference on Communication Systems & Networks (COMSNETS).

[11]  Peter Luksch,et al.  A Multi-agent Model for Security Awareness Driven by Home User’s Behaviours , 2018, Proceedings of the Future Technologies Conference (FTC) 2018.

[12]  Nitesh V. Chawla,et al.  DeepCrime: Attentive Hierarchical Recurrent Networks for Crime Prediction , 2018, CIKM.

[13]  Akira Yamada,et al.  Predicting Impending Exposure to Malicious Content from User Behavior , 2018, CCS.

[14]  Tudor Dumitras,et al.  Asking for a Friend: Evaluating Response Biases in Security User Studies , 2018, CCS.

[15]  Christo Wilson,et al.  Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications , 2018, Proc. Priv. Enhancing Technol..

[16]  Lior Rokach,et al.  Predict Demographic Information Using Word2vec on Spatial Trajectories , 2018, UMAP.

[17]  Narseo Vallina-Rodriguez,et al.  “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale , 2018, Proc. Priv. Enhancing Technol..

[18]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[19]  Rami Puzis,et al.  Taxonomy of mobile users' security awareness , 2018, Comput. Secur..

[20]  Fahimeh Farahnakian,et al.  A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[21]  Chang Hoon Kim,et al.  Classifying malware using convolutional gated neural network , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[22]  Abien Fred Agarap A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.

[23]  Shamal Faily,et al.  Persona-centred information security awareness , 2017, Comput. Secur..

[24]  Sokratis K. Katsikas,et al.  User Modelling Validation over the Security Awareness of Digital Natives , 2017, Future Internet.

[25]  Vince Bruno,et al.  Applications of social network analysis in behavioural information security research: Concepts and empirical analysis , 2017, Comput. Secur..

[26]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[27]  George K. Karagiannidis,et al.  Security Awareness of the Digital Natives , 2017, Inf..

[28]  Malcolm Robert Pattinson,et al.  Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..

[29]  Rick Wash,et al.  Can People Self-Report Security Accurately?: Agreement Between Self-Report and Behavioral Measures , 2017, CHI.

[30]  Wenwu Zhu,et al.  Structural Deep Network Embedding , 2016, KDD.

[31]  Hein S. Venter,et al.  Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..

[32]  Tuomas Aura,et al.  An SDN-based approach to enhance the end-to-end security: SSL/TLS case study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[33]  Serge Egelman,et al.  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) , 2015, CHI.

[34]  Siddhi Pittayachawan,et al.  Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach , 2015, Comput. Secur..

[35]  Young-Sik Jeong,et al.  An enhanced smartphone security model based on information security management system (ISMS) , 2014, Electron. Commer. Res..

[36]  Dimitris Gritzalis,et al.  Mobile devices: A phisher's paradise , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).

[37]  Leyla Bilge,et al.  On the effectiveness of risk prediction based on users browsing behavior , 2014, AsiaCCS.

[38]  Vitaly Shmatikov,et al.  Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.

[39]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[40]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[41]  Jeffrey Dean,et al.  Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.

[42]  David D. Cox,et al.  Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures , 2013, ICML.

[43]  Rossouw von Solms,et al.  Phishing for phishing awareness , 2013, Behav. Inf. Technol..

[44]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[45]  Ling Chen,et al.  A context-aware personalized travel recommendation system based on geotagged social media data mining , 2013, Int. J. Geogr. Inf. Sci..

[46]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[47]  Xinghui Li,et al.  A Study of Man-in-the-Middle Attack Based on SSL Certificate Interaction , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[48]  Gorazd Kandus,et al.  Bluetooth® usage among students as an indicator of security awareness and feeling , 2011, Proceedings ELMAR-2011.

[49]  Tapio Soikkeli,et al.  Diversity and End User Context in Smartphone Usage Sessions , 2011, 2011 Fifth International Conference on Next Generation Mobile Applications, Services and Technologies.

[50]  Wei Liu,et al.  A survey on context awareness , 2011, 2011 International Conference on Computer Science and Service System (CSSS).

[51]  Georgios Kambourakis,et al.  iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.

[52]  P. Ifinedo An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions , 2011 .

[53]  Fadi A. Thabtah,et al.  Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[54]  Ryen W. White,et al.  Predicting user interests from contextual information , 2009, SIGIR.

[55]  Lorrie Faith Cranor,et al.  School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.

[56]  Gediminas Adomavicius,et al.  Context-aware recommender systems , 2008, RecSys '08.

[57]  Lorrie Faith Cranor,et al.  Protecting people from phishing: the design and evaluation of an embedded training email system , 2007, CHI.

[58]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[59]  Hennie A. Kruger,et al.  A prototype for assessing information security awareness , 2006, Comput. Secur..

[60]  Evangelos A. Kiountouzis,et al.  Information systems security policies: a contextual perspective , 2005, Comput. Secur..

[61]  Éric Gaussier,et al.  A Probabilistic Interpretation of Precision, Recall and F-Score, with Implication for Evaluation , 2005, ECIR.

[62]  S. Yue,et al.  Power of the Mann–Whitney test for detecting a shift in median or mean of hydro-meteorological data , 2002 .

[63]  Jan H. P. Eloff,et al.  Feature: What Makes an Effective Information Security Policy? , 2002 .

[64]  David J. Hand,et al.  A Simple Generalisation of the Area Under the ROC Curve for Multiple Class Classification Problems , 2001, Machine Learning.

[65]  R. F. Sari,et al.  IMPLEMENTATION OF MACHINE LEARNING FOR HUMAN ASPECT IN INFORMATION SECURITY AWARENESS , 2021 .

[66]  Agata McCormac,et al.  More than the individual: Examining the relationship between culture and Information Security Awareness , 2020, Comput. Secur..

[67]  Abhishek Singhal,et al.  Dynamic Classification Mining Techniques for Predicting Phishing URL , 2018 .

[68]  Jethro G. Beekman,et al.  Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling , 2013 .

[69]  Engin Kirda,et al.  Insights into User Behavior in Dealing with Internet Attacks , 2012, NDSS.