Contextual security awareness: A context-based approach for assessing the security awareness of users
暂无分享,去创建一个
L. Rokach | A. Shabtai | Bracha Shapira | Rami Puzis | Ron Bitton | Adir Solomon | Michael Michaelshvili
[1] Fei Long,et al. Improved Personalized Recommendation Algorithm Based on Context-Aware in Mobile Computing Environment , 2020, Wirel. Commun. Mob. Comput..
[2] Li Guo,et al. Unveiling SSL/TLS MITM Hosts in the Wild , 2020, 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE).
[3] Eliad Shem Tov,et al. Evolving Context-Aware Recommender Systems With Users in Mind , 2020, Expert Syst. Appl..
[4] Wafa Shafqat,et al. A Context-Aware Location Recommendation System for Tourists Using Hierarchical LSTM Model , 2020, Sustainability.
[5] Meenu,et al. Phishing Website Detection Based on Machine Learning: A Survey , 2020, 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS).
[6] John Waterworth,et al. Predicting Personal Susceptibility to Phishing , 2020, ICITS.
[7] Ali A. Ghorbani,et al. Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.
[8] Rami Puzis,et al. Evaluating the Information Security Awareness of Smartphone Users , 2019, CHI.
[9] Hussain Aldawood,et al. Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues , 2019, Future Internet.
[10] Navneet Goyal,et al. A Comparison of Machine Learning Attributes for Detecting Malicious Websites , 2019, 2019 11th International Conference on Communication Systems & Networks (COMSNETS).
[11] Peter Luksch,et al. A Multi-agent Model for Security Awareness Driven by Home User’s Behaviours , 2018, Proceedings of the Future Technologies Conference (FTC) 2018.
[12] Nitesh V. Chawla,et al. DeepCrime: Attentive Hierarchical Recurrent Networks for Crime Prediction , 2018, CIKM.
[13] Akira Yamada,et al. Predicting Impending Exposure to Malicious Content from User Behavior , 2018, CCS.
[14] Tudor Dumitras,et al. Asking for a Friend: Evaluating Response Biases in Security User Studies , 2018, CCS.
[15] Christo Wilson,et al. Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications , 2018, Proc. Priv. Enhancing Technol..
[16] Lior Rokach,et al. Predict Demographic Information Using Word2vec on Spatial Trajectories , 2018, UMAP.
[17] Narseo Vallina-Rodriguez,et al. “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale , 2018, Proc. Priv. Enhancing Technol..
[18] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[19] Rami Puzis,et al. Taxonomy of mobile users' security awareness , 2018, Comput. Secur..
[20] Fahimeh Farahnakian,et al. A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[21] Chang Hoon Kim,et al. Classifying malware using convolutional gated neural network , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[22] Abien Fred Agarap. A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.
[23] Shamal Faily,et al. Persona-centred information security awareness , 2017, Comput. Secur..
[24] Sokratis K. Katsikas,et al. User Modelling Validation over the Security Awareness of Digital Natives , 2017, Future Internet.
[25] Vince Bruno,et al. Applications of social network analysis in behavioural information security research: Concepts and empirical analysis , 2017, Comput. Secur..
[26] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[27] George K. Karagiannidis,et al. Security Awareness of the Digital Natives , 2017, Inf..
[28] Malcolm Robert Pattinson,et al. Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..
[29] Rick Wash,et al. Can People Self-Report Security Accurately?: Agreement Between Self-Report and Behavioral Measures , 2017, CHI.
[30] Wenwu Zhu,et al. Structural Deep Network Embedding , 2016, KDD.
[31] Hein S. Venter,et al. Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..
[32] Tuomas Aura,et al. An SDN-based approach to enhance the end-to-end security: SSL/TLS case study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[33] Serge Egelman,et al. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) , 2015, CHI.
[34] Siddhi Pittayachawan,et al. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach , 2015, Comput. Secur..
[35] Young-Sik Jeong,et al. An enhanced smartphone security model based on information security management system (ISMS) , 2014, Electron. Commer. Res..
[36] Dimitris Gritzalis,et al. Mobile devices: A phisher's paradise , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[37] Leyla Bilge,et al. On the effectiveness of risk prediction based on users browsing behavior , 2014, AsiaCCS.
[38] Vitaly Shmatikov,et al. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.
[39] Malcolm Robert Pattinson,et al. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..
[40] Sancheng Peng,et al. Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[41] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[42] David D. Cox,et al. Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures , 2013, ICML.
[43] Rossouw von Solms,et al. Phishing for phishing awareness , 2013, Behav. Inf. Technol..
[44] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[45] Ling Chen,et al. A context-aware personalized travel recommendation system based on geotagged social media data mining , 2013, Int. J. Geogr. Inf. Sci..
[46] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[47] Xinghui Li,et al. A Study of Man-in-the-Middle Attack Based on SSL Certificate Interaction , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[48] Gorazd Kandus,et al. Bluetooth® usage among students as an indicator of security awareness and feeling , 2011, Proceedings ELMAR-2011.
[49] Tapio Soikkeli,et al. Diversity and End User Context in Smartphone Usage Sessions , 2011, 2011 Fifth International Conference on Next Generation Mobile Applications, Services and Technologies.
[50] Wei Liu,et al. A survey on context awareness , 2011, 2011 International Conference on Computer Science and Service System (CSSS).
[51] Georgios Kambourakis,et al. iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.
[52] P. Ifinedo. An Exploratory Study of the Relationships between Selected Contextual Factors and Information Security Concerns in Global Financial Services Institutions , 2011 .
[53] Fadi A. Thabtah,et al. Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[54] Ryen W. White,et al. Predicting user interests from contextual information , 2009, SIGIR.
[55] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[56] Gediminas Adomavicius,et al. Context-aware recommender systems , 2008, RecSys '08.
[57] Lorrie Faith Cranor,et al. Protecting people from phishing: the design and evaluation of an embedded training email system , 2007, CHI.
[58] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[59] Hennie A. Kruger,et al. A prototype for assessing information security awareness , 2006, Comput. Secur..
[60] Evangelos A. Kiountouzis,et al. Information systems security policies: a contextual perspective , 2005, Comput. Secur..
[61] Éric Gaussier,et al. A Probabilistic Interpretation of Precision, Recall and F-Score, with Implication for Evaluation , 2005, ECIR.
[62] S. Yue,et al. Power of the Mann–Whitney test for detecting a shift in median or mean of hydro-meteorological data , 2002 .
[63] Jan H. P. Eloff,et al. Feature: What Makes an Effective Information Security Policy? , 2002 .
[64] David J. Hand,et al. A Simple Generalisation of the Area Under the ROC Curve for Multiple Class Classification Problems , 2001, Machine Learning.
[65] R. F. Sari,et al. IMPLEMENTATION OF MACHINE LEARNING FOR HUMAN ASPECT IN INFORMATION SECURITY AWARENESS , 2021 .
[66] Agata McCormac,et al. More than the individual: Examining the relationship between culture and Information Security Awareness , 2020, Comput. Secur..
[67] Abhishek Singhal,et al. Dynamic Classification Mining Techniques for Predicting Phishing URL , 2018 .
[68] Jethro G. Beekman,et al. Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling , 2013 .
[69] Engin Kirda,et al. Insights into User Behavior in Dealing with Internet Attacks , 2012, NDSS.