The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HAISA"( http://dblp.L3S.de/Venues/HAISA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/haisa

Publication years (Num. hits)
2008-2009 (27) 2011-2012 (33) 2014 (21) 2015 (26) 2016 (28) 2017 (26) 2018 (25) 2019 (19) 2020 (28) 2021 (19) 2022 (26) 2023 (38)
Publication types (Num. hits)
inproceedings(302) proceedings(14)
Venues (Conferences, Journals, ...)
HAISA(316)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 316 publication records. Showing 316 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bryan Cline An Implementation Process and Factor Model for Information Systems Security Engineering. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Isabella Santa The ENISA Awareness Raising Community. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Ali Shayan, Komeil Soheili, Behnam Abdi Human excellence in the information security: a complexity theory perspective. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1André Gagné, Kasia Muldner, Konstantin Beznosov Identifying Differences between Security and other IT Professionals: a Qualitative Analysis. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Taimur Bakhshi, Maria Papadaki, Steven Furnell A Practical Assessment of Social Engineering Vulnerabilities. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Christopher Soghoian, Oliver Friedrichs, Markus Jakobsson The Threat of Political Phishing. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Nathan L. Clarke, Steven Furnell (eds.) 2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Kirsi Helkala, Einar Snekkenes A method for ranking authentication products. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Freddy Andreassen, Einar Snekkenes Security and privacy awareness of home PC users in Norway. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Martyn Styles, Theodore Tryfonas Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Trish Williams How addressing implementation issues can assist in medical information security governance. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1David James Bennett, Paul Stephens A Usability Analysis of the Autopsy Forensic Browser. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Ahmed Awad E. Ahmed, Issa Traoré, Almulhem Ahmed Digital Fingerprinting Based on Keystroke Dynamics. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov Human, Organizational and Technological Challenges of Implementing IT Security in Organizations. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Marcus Nohlberg, Stewart Kowalski The cycle of deception - a model of social engineering attacks, defenses and victims. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
1Jan Schlüter, Stephanie Teufel secalyser - a system to plan training for employees. Search on Bibsonomy HAISA The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #301 - #316 of 316 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license