Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)
Case Study – Exploring Children’s Password Knowledge and Practices
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read More“I didn't click”: What users say when reporting phishing
Nikolas Pilavakis, Adam Jenkins, Nadin Kokciyan, Kami Vaniea (University of Edinburgh)
Read MoreReplication: Do We Snooze If We Can't Lose? Modelling...
Karoline Busse (University of Bonn); Dominik Wermke (Leibniz University Hannover); Sabrina Amft (University of Bonn); Sascha Fahl (Leibniz University Hannover); Emanuel von Zezschwitz, Matthew Smith (University of Bonn)
Read More