找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Human Aspects of Information Security and Assurance; 15th IFIP WG 11.12 I Steven Furnell,Nathan Clarke Conference proceedings 2021 IFIP Int

[復(fù)制鏈接]
樓主: GURU
21#
發(fā)表于 2025-3-25 06:56:44 | 只看該作者
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Educationengage students with content and can complement more traditional approaches to learning. This article proposes SherLOCKED, a new serious game created in the style of a 2D top-down puzzle adventure. The game is situated in the context of an undergraduate cyber security course, and is used to consolid
22#
發(fā)表于 2025-3-25 10:40:10 | 只看該作者
23#
發(fā)表于 2025-3-25 13:36:22 | 只看該作者
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schoolsecurity policy is contextually dependent and there is no agreement on what organisations should include in their security policies. This paper argues that analysing information security policy documents could potentially provide new insights into existing issues with security practices. The paper ex
24#
發(fā)表于 2025-3-25 18:37:19 | 只看該作者
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Childrenly with the result that cell phones, tablets and similar devices are more accessible to both young and old. Technological advancements create many opportunities, however it also exposes its users to many threats. Pre-school children are especially vulnerable to these threats, as they are rarely made
25#
發(fā)表于 2025-3-25 19:59:38 | 只看該作者
26#
發(fā)表于 2025-3-26 00:30:27 | 只看該作者
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devicesndamental means of ensuring safe use. Given the paucity of information provided with many devices at the time of purchase, this paper engages in a critical study of the type of advice that home Internet of Things (IoT) or smart device users might be presented with on the Internet to inform their cyb
27#
發(fā)表于 2025-3-26 05:13:26 | 只看該作者
Making Access Control Easy in IoTiguration Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task Force (IETF) to automate the protection of IoT devices by micro-segmentation using dynamic access control lists. The protocol defines a conceptually straightforward method to implement access control upon
28#
發(fā)表于 2025-3-26 09:43:23 | 只看該作者
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigationological advances and the cyber threat landscape. This outcome highlighted once more the cybersecurity skills shortage and the necessity to address this gap. A solution to this, is to consider a multidisciplinary cybersecurity workforce with professionals originating from different backgrounds, beyo
29#
發(fā)表于 2025-3-26 14:42:09 | 只看該作者
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishinghe convenient use of a mobile phone. At the same time, criminals are able to utilise this technology to their own benefit, such as by sending phishing messages that convince their victims into sharing sensitive information or installing dangerous software on their devices. Indeed, Proofpoint’s State
30#
發(fā)表于 2025-3-26 19:48:56 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-14 04:21
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
文山县| 江华| 新源县| 济南市| 阿坝县| 边坝县| 项城市| 岑巩县| 介休市| 宜章县| 广东省| 灌南县| 景东| 阿城市| 泸溪县| 玛纳斯县| 繁峙县| 邵武市| 双峰县| 河源市| 大方县| 萨嘎县| 乌审旗| 盱眙县| 十堰市| 丹巴县| 防城港市| 古浪县| 四子王旗| 沈丘县| 台山市| 济宁市| 曲沃县| 萨嘎县| 光泽县| 西丰县| 图木舒克市| 兴化市| 金川县| 宜兰市| 东阳市|