Linked e-resources

Details

Cybersecurity management through logging analytics
Adaptive weak secrets for authenticated key exchange
Internet of things and distributed denial of service mitigation
Eye tracking graphical passwords
Understanding and discovering SQL injection vulnerabilities
Grid framework to address password memorability issues and offline password attacks
Exploring 3D cybersecurity visualization with the Microsoft HoloLens
Humans as the strong link in securing the total learning architecture
Preserving dignity, maintaining security and acting ethically
Human factors in information security culture: A literature review
Do you really trust “privacy policy” or “terms of use” agreements without reading them?
Users? attitudes towards the “going dark” debate
The use of cloud computing applications in education: Privacy and security concerns. .

Browse Subjects

Show more subjects...

Statistics

from
to
Export