-
2
-
-
78049402642
-
-
House of Lords. Science and Technology Committee. HL Paper 165-I. London: The Stationery Limited, accessed: 15/11/2009
-
House of Lords. Science and Technology Committee. 5th Report of Session 2006-07. Personal Internet Security. United Kingdom Parliament. HL Paper 165-I. London: The Stationery Limited, http://www.parliament.the-stationery-office.co. uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf (accessed: 15/11/2009)
-
5th Report of Session 2006-07. Personal Internet Security
-
-
-
3
-
-
78049372841
-
Assessing the Challenges of Intrusion Detection Systems
-
Ibrahim, T., Furnell, S.M., Papadaki, M., Clarke, N.L.: Assessing the Challenges of Intrusion Detection Systems. In: Proceedings of the 7th Annual Security Conference. Las Vegas, USA (June 2-3, 2008)
-
Proceedings of the 7th Annual Security Conference. Las Vegas, USA (June 2-3, 2008)
-
-
Ibrahim, T.1
Furnell, S.M.2
Papadaki, M.3
Clarke, N.L.4
-
5
-
-
84873114661
-
Assessing the Usability of Personal Internet Security Tools
-
Ibrahim, T., Furnell, S.M., Papadaki, M., Clarke, N.L.: Assessing the Usability of Personal Internet Security Tools. In: Proceedings of the 8th European Conference on Information Warfare and Security (ECIW 2009), Military Academy, Lisbon & the University of Minho, Braga, Portugal (July 6-7, 2009)
-
Proceedings of the 8th European Conference on Information Warfare and Security (ECIW 2009), Military Academy, Lisbon & the University of Minho, Braga, Portugal (July 6-7, 2009)
-
-
Ibrahim, T.1
Furnell, S.M.2
Papadaki, M.3
Clarke, N.L.4
-
6
-
-
0028121958
-
Enhancing the explanatory power of usability heuristics
-
Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of ACM CHI'94 Conference, Boston, Massachusetts, USA, April 24-28, pp. 152-158 (1994)
-
(1994)
Proceedings of ACM CHI'94 Conference, Boston, Massachusetts, USA, April 24-28
, pp. 152-158
-
-
Nielsen, J.1
-
7
-
-
0012344373
-
-
accessed: 14/12/2008
-
Nielsen, J.: Ten usability heuristics, http://www.useit.com/papers/ heuristic/heuristic-list.html (accessed: 14/12/2008)
-
Ten Usability Heuristics
-
-
Nielsen, J.1
-
8
-
-
0347025921
-
Security and human computer interfaces
-
Johnston, J., Eloff, J.H.P., Labuschagne, L.: Security and human computer interfaces. Computers & Security 22(8), 675-684 (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
9
-
-
78049401079
-
-
accessed: 26/01/2009
-
Top Security Software, http://www.2009securitysoftwarereviews.com (accessed: 26/01/2009)
-
Top Security Software
-
-
-
10
-
-
70049087018
-
Towards a Taxonomy of Network Scanning Techniques
-
Barnett, R.J., Irwin, B.: Towards a Taxonomy of Network Scanning Techniques. In: Proceedings of the 2008 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries: Riding the Wave of technology (SAICSIT '08), Wilderness, South Africa, October 6-8, pp. 1-7 (2008)
-
(2008)
Proceedings of the 2008 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries: Riding the Wave of Technology (SAICSIT '08), Wilderness, South Africa, October 6-8
, pp. 1-7
-
-
Barnett, R.J.1
Irwin, B.2
-
12
-
-
84870623596
-
-
Nmap accessed: 26/01/2009
-
Nmap. Nmap Security Scanner, http://insecure.org/nmap (accessed: 26/01/2009)
-
Nmap Security Scanner
-
-
-
13
-
-
62649136955
-
A Dynamic Fusion Approach for Security Situation Assessment
-
Siraj, A., Vaughn, R.: A Dynamic Fusion Approach for Security Situation Assessment. In: Proceedings of the Fourth IASTED International Conference on Communication, Network, and Information Security (CNIS 2007), Berkeley, California (September 24-26, 2007)
-
Proceedings of the Fourth IASTED International Conference on Communication, Network, and Information Security (CNIS 2007), Berkeley, California (September 24-26, 2007)
-
-
Siraj, A.1
Vaughn, R.2
-
14
-
-
78049372520
-
Even experts deserve usable security: Design guidelines for security management systems
-
Chiasson, S., van Oorschot, P.C., Biddle, R.: Even experts deserve usable security: Design guidelines for security management systems. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS '07), Pittsburgh, PA, July 18-20 (2007)
-
Proceedings of Symposium on Usable Privacy and Security (SOUPS '07), Pittsburgh, PA, July 18-20 (2007)
-
-
Chiasson, S.1
Van Oorschot, P.C.2
Biddle, R.3
|