Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2017
- Nouf Aljaffan, Haiyue Yuan, Shujun Li:
PSV (Password Security Visualizer): From Password Checking to User Education. HCI (22) 2017: 191-211 - Kallia Anastasopoulou, Spyros Kokolakis, Panagiotis Andriotis:
Privacy Decision-Making in the Digital Era: A Game Theoretic Review. HCI (22) 2017: 589-603 - Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, Gianluca Stringhini:
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model. HCI (22) 2017: 604-622 - Frans F. Blauw:
Dear Password, I Know You Too Well - A Congenial Call for Ubiquitous Authentication. HCI (22) 2017: 212-225 - Pam Briggs, Debora Jeske, Lynne M. Coventry:
The Design of Messages to Improve Cybersecurity Incident Reporting. HCI (22) 2017: 3-13 - Oliver Buckley, Duncan Hodges, Melissa Hadgkiss, Sarah Morris:
Keystroke Inference Using Smartphone Kinematics. HCI (22) 2017: 226-238 - Ahto Buldas, Märt Saarepera:
Are the Current System Engineering Practices Sufficient to Meet Cyber Crime? HCI (22) 2017: 451-463 - Scott Cadzow:
Overcoming Fear of the Threat Model. HCI (22) 2017: 14-24 - Lizzie Coles-Kemp, René Rydhof Hansen:
Walking the Line: The Everyday Security Ties that Bind. HCI (22) 2017: 464-480 - Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. HCI (22) 2017: 25-44 - Titiana Ertiö, Pekka Räsänen:
Mobile Online Proficiency and Mobile Internet Use - Findings from Finland. HCI (22) 2017: 45-56 - Tesleem Fagade, Theodoros Spyridopoulos, Nabeel Albishry, Theodore Tryfonas:
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis. HCI (22) 2017: 309-321 - Lucas Ferreira, Junia Anacleto:
Usability in Solutions of Secure Email - A Tools Review. HCI (22) 2017: 57-73 - Denis Feth, Andreas Maier, Svenja Polst:
A User-Centered Model for Usable Security and Privacy. HCI (22) 2017: 74-89 - Nina Gerber, Paul Gerber, Maria Hernando:
Sharing the 'Real Me' - How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook. HCI (22) 2017: 640-655 - Marco Ghiglieri, Melanie Volkamer, Karen Renaud:
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. HCI (22) 2017: 656-674 - Thomas Given-Wilson, Axel Legay, Sean Sedwards:
Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults. HCI (22) 2017: 90-109 - Joanne Hinds, Adam N. Joinson:
Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI. HCI (22) 2017: 481-493 - Duncan Hodges, Oliver Buckley:
Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals. HCI (22) 2017: 494-506 - Seokjun Hong, Youngsun Kim, Gerard Jounghyun Kim:
Developing Usable Interface for Internet of Things (IoT) Security Analysis Software. HCI (22) 2017: 322-328 - Hsiao-Ying Huang, Masooda N. Bashir:
Android App Permission and Users' Adoption: A Case Study of Mental Health Application. HCI (22) 2017: 110-122 - Manabu Ishihara, Taiki Kanayama:
Visualization Technologies of Information Security Support System Using Haptic Devices. HCI (22) 2017: 329-338 - Florian Kammüller:
Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems. HCI (22) 2017: 339-352 - Oksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer:
Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information. HCI (22) 2017: 675-690 - Christopher Lentzsch, Kai-Uwe Loser, Martin Degeling, Alexander Nolte:
Integrating a Practice Perspective to Privacy by Design. HCI (22) 2017: 691-702 - Hui Li, Wenling Liu, Bin Wang, Wen Zhang:
Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in Android. HCI (22) 2017: 703-721 - Noura Al Moubayed, David Wall, A. Stephen McGough:
Identifying Changes in the Cybersecurity Threat Landscape Using the LDA-Web Topic Modelling Data Search Engine. HCI (22) 2017: 287-295 - Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi:
Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders. HCI (22) 2017: 353-365 - Danilo M. Nogueira, Cristiano Maciel, José Viterbo, Daniel Vecchiato:
A Privacy-Driven Data Management Model for Smart Personal Assistants. HCI (22) 2017: 722-738 - Norbert Nthala, Ivan Flechais:
"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions. HCI (22) 2017: 123-142
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-16 05:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint