The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CPT with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2005 (16) 2006-2007 (18) 2008-2009 (18) 2010-2016 (16) 2017-2019 (44) 2020 (52) 2021 (49) 2022 (43) 2023 (50) 2024 (4)
Publication types (Num. hits)
article(69) incollection(2) inproceedings(234) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 34 occurrences of 33 keywords

Results
Found 310 publication records. Showing 310 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Nirmal Acharya, Abhishek Sharma Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Markus Frogner Werner, Ida Ness, Cristina Paupini Privacy in the Smart Household: Towards a Risk Assessment Model for Domestic IoT. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Maria Chaparro Osman, Andrew Nakushian, Summer Rebensky, Tricia Prior, Meredith B. Carroll User Experience, Knowledge, Perceptions, and Behaviors Associated with Internet of Things (IoT) Device Information Privacy. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ruichen Cong, Yixiao Liu, Yenjou Wang, Kiichi Tago, Ruidong Li, Hitoshi Asaeda, Qun Jin Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Michael Shlega, Sana Maqsood, Sonia Chiasson Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and Adoption. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Shreya Gupta, Steven Furnell From Cybersecurity Hygiene to Cyber Well-Being. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Zhiwei Jiang, Guiwu Wei 0001, Jiang Wu 0002, Xudong Chen 0003 CPT-TODIM method for picture fuzzy multiple attribute group decision making and its application to food enterprise quality credit evaluation. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Huiyuan Zhang, Guiwu Wei 0001, Xudong Chen 0003 CPT-MABAC method for spherical fuzzy multiple attribute group decision making and its application to green supplier selection. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Mengwei Zhao, Guiwu Wei 0001, Cun Wei, Jiang Wu 0002, Yu Wei Extended CPT-TODIM method for interval-valued intuitionistic fuzzy MAGDM and its application to urban ecological risk assessment. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Ningna Liao, Hui Gao, Guiwu Wei 0001, Xudong Chen 0003 CPT-MABAC-Based multiple attribute group decision making method with probabilistic hesitant fuzzy information. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Atrayee Majumder, Rogers Mathew, Deepak Rajendraprasad Dimension of CPT Posets. Search on Bibsonomy Order The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Longkai Dong, Chao Wang 0004, Yixian Tang, Hong Zhang 0001, Lu Xu 0005 Improving CPT-InSAR Algorithm with Adaptive Coherent Distributed Pixels Selection. Search on Bibsonomy Remote. Sens. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Mengwei Zhao, Guiwu Wei 0001, Cun Wei, Yanfeng Guo CPT-TODIM method for bipolar fuzzy multi-attribute group decision making and its application to network security service provider selection. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Helmo K. Morales Paredes, Diego T. Rodrigues, Juan Carlos Cebrian, Jakson Paulo Bonaldo CPT-Based Multi-Objective Strategy for Power Quality Enhancement in Three-Phase Three-Wire Systems Under Distorted and Unbalanced Voltage Conditions. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Yunhua Ding, Teague D. Olewiler, Mohammad Farhan Rawnak Penning-Trap Searches for Lorentz and CPT Violation. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Timothy B. Watson, Zdzislaw E. Musielak Chiral Dirac Equation and Its Spacetime and CPT Symmetries. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Davide Fiscaletti, Ignazio Licata, Fabrizio Tamburini CPT Symmetry in Two-Fold de Sitter Universe. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Yuan Yao, Ao Zhang, Zhengyan Zhang, Zhiyuan Liu 0001, Tat-Seng Chua, Maosong Sun 0001 CPT: Colorful Prompt Tuning for Pre-trained Vision-Language Models. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Chaitanya Kaul, Joshua Mitton, Hang Dai, Roderick Murray-Smith CpT: Convolutional Point Transformer for 3D Point Cloud Processing. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Yonggan Fu, Han Guo, Meng Li 0004, Xin Yang, Yining Ding, Vikas Chandra, Yingyan Lin CPT: Efficient Deep Neural Network Training via Cyclic Precision. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Yunfan Shao, Zhichao Geng, Yitao Liu, Junqi Dai, Fei Yang, Li Zhe, Hujun Bao, Xipeng Qiu CPT: A Pre-Trained Unbalanced Transformer for Both Chinese Language Understanding and Generation. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Biljana P. Mihailovic, Endre Pap, Mirjana Strboja, Ana Simicevic Corrigendum to "A unified approach to the monotone integral-based premium principles under the CPT theory" [Fuzzy Sets and Systems 398 (2020) 78-97]. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Abbas Moallem (eds.) HCI for Cybersecurity, Privacy and Trust - Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Jared Markowitz, Marie Chau, I-Jeng Wang Deep CPT-RL: Imparting Human-Like Risk Sensitivity to Artificial Agents. Search on Bibsonomy SafeAI@AAAI The full citation details ... 2021 DBLP  BibTeX  RDF
24Yonggan Fu, Han Guo, Meng Li 0004, Xin Yang, Yining Ding, Vikas Chandra, Yingyan Lin CPT: Efficient Deep Neural Network Training via Cyclic Precision. Search on Bibsonomy ICLR The full citation details ... 2021 DBLP  BibTeX  RDF
24Nicola Fairburn, Andrew Shelton, Frances Ackroyd, Rachel Selfe Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience - An Applied Practice Case Study Discussing Approaches to Assessing Human Factors Vulnerabilities in Cyber-Security Systems. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Toshinori Fukunaga, Ryohei Suzuki, Masayuki Kanda Brand Validation: Security Indicator to Better Indicate Website Identity. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Summer Rebensky, Meredith B. Carroll, Andrew Nakushian, Maria Chaparro, Tricia Prior Understanding the Last Line of Defense: Human Response to Cybersecurity Events. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Daniel Wilusz, Adam Wójtowicz Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Satoshi Ozaki, Hiroshi Furukawa Study on the Impact of Learning About Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Birgy Lorenz, Kaido Kikkas, Aleksei Talisainen, Taavi Eomäe CyberPin - Challenges on Recognizing Youngest Cyber Talents. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Zainab Agha, Reza Ghaiumy Anaraky, Karla A. Badillo-Urquiola, Bridget Christine McHugh, Pamela J. Wisniewski 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Lauren S. Ferro, Andrea Marrella, Tiziana Catarci A Human Factor Approach to Threat Modeling. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Marco Saltarella, Giuseppe Desolda, Rosa Lanzilotti Privacy Design Strategies and the GDPR: A Systematic Literature Review. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Biao Wang, Zhengang Zhai, Bingtao Gao, Li Zhang Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Elham Al Qahtani, Lipsarani Sahoo, Mohamed Shehab The Effectiveness of Video Messaging Campaigns to Use 2FA. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Salsabil Hamadache, Malte Elson Development of a Novice-Friendly Representation of Camouflaged Boolean Networks. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24George Raywood-Burke, Laura M. Bishop, Phoebe M. Asquith, Phillip L. Morgan Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Joseph Aneke, Carmelo Ardito, Giuseppe Desolda Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Ana Ferreira 0001, Joana Muchagata, Pedro Vieira-Marques, Diogo Abrantes, Soraia Teles Perceptions of Security and Privacy in mHealth. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Aimee Kendall Roundtree Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Jongkeon Kim, Jeongyun Heo Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24May Almousa, Yang Liu 0218, Tianyang Zhang, Mohd Anwar A Study on Online Businesses' Commitment to Consumer Privacy. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Chris Nichols, Geoff Stoker, Ulku Clark Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Tian Wang, Masooda N. Bashir Gaming Apps' and Social Media Partnership: A Privacy Perspective. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Pantelitsa Leonidou, Argyris Constantinides, Marios Belk, Christos Fidas, Andreas Pitsillides Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Hélène Fournier, Irina Kondratova, Keiko Katsuragawa Smart Technologies and Internet of Things Designed for Aging in Place. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Michihiro Nakayama, Akira Kanaoka Risk Assessment of "Ostrich ZIP". Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24John Brian Pickering, Costas Boletsis, Ragnhild Halvorsrud, Stephen C. Phillips, Mike Surridge It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Aniqa Alam, Robert Biddle, Elizabeth Stobert Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal? Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Karsten Martiny, Mark F. St. John, Grit Denker, Christopher Korkos, Linda Briesemeister Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Aniqa Alam, Heather Molyneaux, Elizabeth Stobert Authentication Management of Home IoT Devices. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Nikol Mashtalyar, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak, Suprio Ray Social Engineering Attacks: Recent Advances and Challenges. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24María Inés Navarro-Hernández, Roberto Tomás, Juan M. Lopez-Sanchez, Abraham Cardenas-Tristan, Jordi J. Mallorquí Spatial Analysis of Land Subsidence in the San Luis Potosi Valley Induced by Aquifer Overexploitation Using the Coherent Pixels Technique (CPT) and Sentinel-1 InSAR Observation. Search on Bibsonomy Remote. Sens. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Antonio Di Domenico Testing CPT Symmetry with Neutral K Mesons: A Review. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Vito Antonelli, Lino Miramonti, Marco Danilo Claudio Torri Phenomenological Effects of CPT and Lorentz Invariance Violation in Particle and Astroparticle Physics. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Yaroslav Balytskyi, Sang-Yoon Chang, Anatoliy Pinchuk, Manohar Raavi Discriminating an Arbitrary Number of Pure Quantum States by the Combined CPT and Hermitian Measurements. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24Biljana P. Mihailovic, Endre Pap, Mirjana Strboja, Ana Simicevic A unified approach to the monotone integral-based premium principles under the CPT theory. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Tarek M. Mostafa, Dai Bui, Aam Muharam, Aiguo Patrick Hu, Reiji Hattori Load Effect Analysis and Maximum Power Transfer Tracking of CPT System. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Abbas Moallem (eds.) HCI for Cybersecurity, Privacy and Trust - Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Emanuel Schmitt, Jan-Niklas Voigt-Antons Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor Readings. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Jens Mehrfeld Cyber Security Threats and Incidents in Industrial Control Systems. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Andrew Reeves, Dragana Calic, Paul H. Delfabbro Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity? Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Edden Kashi, Angeliki Zavou Did I Agree to This? Silent Tracking Through Beacons. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Susen Döbelt, Josephine Halama, Sebastian Fritsch, Minh-Hoang Nguyen, Franziska Bocklisch Clearing the Hurdles: How to Design Privacy Nudges for Mobile Application Users. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Suzanne Prior, Natalie Coull Parents Unwittingly Leak Their Children's Data: A GDPR Time Bomb? Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Michael Kubach, Heiko Roßnagel Smart Assistants in IT Security - An Approach to Addressing the Challenge by Leveraging Assistants' Specific Features. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24George Chalhoub, Ivan Flechais "Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Laheem Khan, Kovila P. L. Coopamootoo, Magdalene Ng Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Wei Li, Shuping Yi, Qian Yi, Jiajia Li, Shiquan Xiong An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Laura M. Bishop, Phillip L. Morgan, Phoebe M. Asquith, George Raywood-Burke, Adam Wedgbury, Kevin Jones Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24David Blank, Ravi Kanth Kosuru Building Connections for a Secure User Experience. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Hamed AlQahtani, Manolya Kavakli-Thorne, Majed Abdullah Alrowaily The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR). Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Heather Molyneaux, Elizabeth Stobert, Irina Kondratova, Manon Gaudet Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Bilal Naqvi, Jari Porras Usable Security by Design: A Pattern Approach. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Andrew Reeves, Kathryn Parsons, Dragana Calic Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness? Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Panagiotis Andriotis, Atsuhiro Takasu To Allow, or Deny? That is the Question. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Akihiro Tachikawa, Akira Kanaoka Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Katie Paxton-Fear, Duncan Hodges, Oliver Buckley Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Yuhan Wang, Qian Yi, Shuping Yi, Jiajia Li, Shiquan Xiong Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Holger Koelmann Perspectives on Information Technology Artefacts in Trust-Related Interactions. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Shadan Ghaffaripour, Ali Miri Enabling Medical Research Through Privacy-Preserving Data Markets. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Adam Wójtowicz, Jacek Chmielewski Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24John M. Blythe, Alan Gray, Emily Collins 0001 Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change? Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Charulata Ghosh, Matthew S. Eastin Understanding Users' Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Fatema Rashid, Ali Miri An Emerging Strategy for Privacy Preserving Databases: Differential Privacy. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Lynne M. Coventry, Dawn Branley-Bell, Elizabeth Sillence, Sabina Magalini, Pasquale Mari, Aimilia Magkanaraki, Kalliopi Anastasopoulou Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Sarah A. Jessup, Gene M. Alarcon, August A. Capiola, Tyler J. Ryan Multi-method Approach Measuring Trust, Distrust, and Suspicion in Information Technology. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Lauren S. Ferro, Francesco Sapio Another Week at the Office (AWATO) - An Interactive Serious Game for Threat Modeling Human Factors. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Artem Voronkov, Leonardo A. Martucci Natural vs. Technical Language Preference and Their Impact on Firewall Configuration. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Birgy Lorenz, Kaido Kikkas "Trust Me, You Will Need It": Cybersecurity as Extracurricular Subject at Estonian Schools. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Kirsten E. Richards Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Tanusree Sharma, Masooda N. Bashir Privacy Apps for Smartphones: An Assessment of Users' Preferences and Limitations. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Phillip L. Morgan, Phoebe M. Asquith, Laura M. Bishop, George Raywood-Burke, Adam Wedgbury, Kevin Jones A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Kaur Kullman, Laurin Buchanan, Anita Komlodi, Don Engel Mental Model Mapping Method for Cybersecurity. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Hamed AlQahtani, Manolya Kavakli-Thorne Does Decision-Making Style Predict Individuals' Cybersecurity Avoidance Behaviour? Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Kingberli Capellan, Manuel Condado, Isabel Morais, Patricia Morreale Analyzing Cybersecurity Understanding Using a Brain Computer Interface. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 310 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license