Vulnerabilities in personal firewalls caused by poor security usability
暂无分享,去创建一个
Audun Josang | Bander Alfayyadh | James Ponting | Mohammed Alzomai | A. Jøsang | Mohammed Alzomai | Bander AlFayyadh | J. Ponting
[1] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[2] Sonia Fahmy,et al. Analysis of vulnerabilities in Internet firewalls , 2003, Comput. Secur..
[3] Cathleen Wharton,et al. Cognitive Walkthroughs: A Method for Theory-Based Evaluation of User Interfaces , 1992, Int. J. Man Mach. Stud..
[4] R. Power. CSI/FBI computer crime and security survey , 2001 .
[5] Martina Angela Sasse,et al. Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery , 2003 .
[6] Juan José,et al. Ranjit Kumar. Research methodology: a step-by-step guide for beginners , 1999 .
[7] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[8] J. D. Tygar,et al. Usability of Security: A Case Study, , 1998 .
[9] Ivan Flechais,et al. Usable Security: What Is It? How Do We Get It? , 2005 .
[10] Peter Gutmann,et al. Security Usability , 2005, IEEE Secur. Priv..
[11] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.
[12] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[13] Audun Jøsang,et al. An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems , 2008, AISC.
[14] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[15] Jan H. P. Eloff,et al. Security and human computer interfaces , 2003, Comput. Secur..
[16] Audun Jøsang,et al. Security Usability Principles for Vulnerability Analysis and Risk Assessment , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[17] A. Smith,et al. Research Methodology: A Step-by-step Guide for Beginners , 2012 .