Keywords: امنیت قابل استفاده; Usable security; Potentially unwanted application; Attractor; Security software; User decision;
مقالات ISI امنیت قابل استفاده (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت قابل استفاده; Usable security; Passwords analytics; Password security; Authorization; Authentication;
Keywords: امنیت قابل استفاده; Security Warning; Chi Square; Cramer's V Test; Usability; Usable Security; Human Computer Interaction;
Keywords: امنیت قابل استفاده; Over-privilege; Mobile applications; Application store; Usable security; Privacy; Android;
Keywords: امنیت قابل استفاده; Usable security; Security awareness; Phishing threats; Security education; Mobile learning; Game based learning;
Keywords: امنیت قابل استفاده; Phishing; Eye tracking; Usable security; User study
Keywords: امنیت قابل استفاده; Usable security; Phishing threats; Security awareness; Security education; Procedural knowledge; Conceptual knowledge
Incognito: Shoulder-surfing resistant selection method
Keywords: امنیت قابل استفاده; Shoulder-surfing; Authentication; PIN; Privacy; Usable security;
Tap-based user authentication for smartwatches
Keywords: امنیت قابل استفاده; Tap-based authentication; Rhythm-based authentication; Smartwatch; Shoulder surfing; Usable security; Biometrics;
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT
Keywords: امنیت قابل استفاده; Smartphone; IoT; Usable security; Automatic fraud detection and prevention; CAPTCHA; Invisible CAPPCHA;
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Keywords: امنیت قابل استفاده; Phishing detection; Email; Thunderbird; Usable security; Tooltips; User studies;
A game design framework for avoiding phishing attacks
Keywords: امنیت قابل استفاده; Game design; Game based learning; Phishing threat; Security awareness; Usable security; Human–computer interaction and design
Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication
Keywords: امنیت قابل استفاده; Security; Usable security; Automated protection; Content; Similarity; HTTP
Usable security: User preferences for authentication methods in eBanking and the effects of experience
Keywords: امنیت قابل استفاده; Usability engineering; Internet banking; Authentication; Usable security; Empirical evaluation; Experience
A comparative study of secure device pairing methods
Keywords: امنیت قابل استفاده; Usable security; Device pairing; Human-assisted authentication; Man-in-the-middle attacks; Key agreement
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
Keywords: امنیت قابل استفاده; Security; Security design; e-Science; Socio-technical design; Usable security
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
Keywords: امنیت قابل استفاده; Security tools; Usable security; Security practitioners; Collaboration; Qualitative analysis
PassPoints: Design and longitudinal evaluation of a graphical password system
Keywords: امنیت قابل استفاده; Graphical password; Alphanumeric password; PassPoints; Authentication; Password security; Usable security;