Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Exploring the meaning of usable security–a literature review
M Lennartsson, J Kävrestad… - Information & Computer …, 2021 - emerald.com
Purpose For decades, literature has reported on the perceived conflict between usability and
security. This mutual trade-off needs to be considered and addressed whenever security …
security. This mutual trade-off needs to be considered and addressed whenever security …
[HTML][HTML] Multi-level fuzzy system for usable-security assessment
Indubitably, security is an integral aspect of the development of quality software. More
importantly, usability is also an elemental and pivotal factor for develo** quality software …
importantly, usability is also an elemental and pivotal factor for develo** quality software …
A comprehensive overview of government hacking worldwide
CY Li, CC Huang, F Lai, SL Lee, J Wu - IEEE Access, 2018 - ieeexplore.ieee.org
There has been an ongoing and heated public policy debate on the appropriate role of and
limitations to government hacking in maintaining a proper balance of national security and …
limitations to government hacking in maintaining a proper balance of national security and …
" I {don't} know why I check this...''-Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks
P Mayer, D Poddebniak, K Fischer… - … Symposium on Usable …, 2022 - usenix.org
OpenPGP is one of the two major standards for end-to-end email security. Several studies
showed that serious usability issues exist with tools implementing this standard. However, a …
showed that serious usability issues exist with tools implementing this standard. However, a …
Getting rid of the usability/security trade-off: a behavioral approach
F Di Nocera, G Tempestini - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
The usability/security trade-off indicates the inversely proportional relationship that seems to
exist between usability and security. The more secure the systems, the less usable they will …
exist between usability and security. The more secure the systems, the less usable they will …
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios
In many scenarios, users have to communicate sensitive data with third parties such as
doctors, lawyers, insurance companies, social workers, or online shops. Handing over …
doctors, lawyers, insurance companies, social workers, or online shops. Handing over …