Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
Current advances, trends and challenges of machine learning and knowledge extraction: from machine learning to explainable AI
In this short editorial we present some thoughts on present and future trends in Artificial
Intelligence (AI) generally, and Machine Learning (ML) specifically. Due to the huge ongoing …
Intelligence (AI) generally, and Machine Learning (ML) specifically. Due to the huge ongoing …
You get where you're looking for: The impact of information sources on code security
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …
unprotected inter-component communication, broken TLS implementations, and violations of …
Developers are not the enemy!: The need for usable security apis
Rather than recognizing software engineers' limitations, modern security practice has
created an adversarial relationship between security software designers and the developers …
created an adversarial relationship between security software designers and the developers …
'Think secure from the beginning' A Survey with Software Developers
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …
paper focuses on the human factors of software security, including human behaviour and …
“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …
Understanding shoulder surfing in the wild: Stories from users and observers
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …
attacks. However, there is little work about shoulder surfing situations in the real world. We …
Do users' perceptions of password security match reality?
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …
passwords are predictable is not well understood. We investigate the relationship between …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Kee** a low profile? Technology, risk and privacy among undocumented immigrants
Undocumented immigrants in the United States face risks of discrimination, surveillance,
and deportation. We investigate their technology use, risk perceptions, and protective …
and deportation. We investigate their technology use, risk perceptions, and protective …