Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The role of eye gaze in security and privacy applications: Survey and future HCI research directions
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …
applications. We present a holistic view on gaze-based security applications. In particular …
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …
organizations. To explore which individual and contextual factors predict phishing …
{Sok}: Still plenty of phish in the sea—a taxonomy of {user-oriented} phishing interventions and avenues for future research
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …
approaches on anti-phishing measures have started to recognize the role of the user, who …
[HTML][HTML] Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment
D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …
attempts, in particular through email, persistently challenge organizations despite …
A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective
GA Thomopoulos, DP Lyras, CA Fidas - Personal and Ubiquitous …, 2024 - Springer
Phishing is one of the most important security threats in modern information systems causing
different levels of damages to end-users and service providers such as financial and …
different levels of damages to end-users and service providers such as financial and …
Understanding phishing email processing and perceived trustworthiness through eye tracking
J McAlaney, PJ Hills - Frontiers in Psychology, 2020 - frontiersin.org
Social engineering attacks in the form of phishing emails represent one of the biggest risks
to cybersecurity. There is a lack of research on how the common elements of phishing …
to cybersecurity. There is a lack of research on how the common elements of phishing …
Humans vs. machines in malware classification
Humans vs. Machines in Malware Classification Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA, USA …
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA, USA …
Investigating teenagers' ability to detect phishing messages
Young people are increasingly becoming responsible for the security of their devices, yet do
not appear to receive formal instruction on how to protect themselves online. In this paper …
not appear to receive formal instruction on how to protect themselves online. In this paper …