ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
Latest Publications
TOTAL DOCUMENTS
12
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By ACM Press
9781450330626
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
An Asset to Security Modeling?
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683474
◽
2014
◽
Cited By ~ 3
Author(s):
Andreas Poller
◽
Sven Türpe
◽
Katharina Kinder-Kurlanda
Keyword(s):
Security Modeling
Download Full-text
Cyber Security as Social Experiment
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683469
◽
2014
◽
Cited By ~ 3
Author(s):
Wolter Pieters
◽
Dina Hadžiosmanović
◽
Francien Dechesne
Keyword(s):
Cyber Security
◽
Social Experiment
Download Full-text
Emergent Properties & Security
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683468
◽
2014
◽
Cited By ~ 1
Author(s):
Nathaniel Husted
◽
Steven Myers
Keyword(s):
Emergent Properties
Download Full-text
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683472
◽
2014
◽
Cited By ~ 3
Author(s):
Justin Cappos
◽
Yanyan Zhuang
◽
Daniela Oliveira
◽
Marissa Rosenthal
◽
Kuo-Chuan Yeh
Keyword(s):
Decision Making
◽
Decision Making Processes
◽
Blind Spots
Download Full-text
Data Is the New Currency
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683477
◽
2014
◽
Cited By ~ 7
Author(s):
Carrie Gates
◽
Peter Matthews
Download Full-text
Isn't that Fantabulous
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683470
◽
2014
◽
Author(s):
Andrew M. White
◽
Katherine Shaw
◽
Fabian Monrose
◽
Elliott Moreton
Download Full-text
Planning and Integrating Deception into Computer Security Defenses
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683482
◽
2014
◽
Cited By ~ 39
Author(s):
Mohammed H. Almeshekah
◽
Eugene H. Spafford
Keyword(s):
Computer Security
Download Full-text
Panel Summary
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683478
◽
2014
◽
Cited By ~ 1
Author(s):
Benjamin Edwards
◽
Michael Locasto
◽
Jeremy Epstein
Keyword(s):
Panel Summary
Download Full-text
A Password Manager that Doesn't Remember Passwords
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683471
◽
2014
◽
Cited By ~ 5
Author(s):
Elizabeth Stobert
◽
Robert Biddle
Download Full-text
Understanding the Experience-Centeredness of Privacy and Security Technologies
Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14
◽
10.1145/2683467.2683475
◽
2014
◽
Cited By ~ 17
Author(s):
Paul Dunphy
◽
John Vines
◽
Lizzie Coles-Kemp
◽
Rachel Clarke
◽
Vasilis Vlachokyriakos
◽
...
Keyword(s):
Privacy And Security
◽
Security Technologies
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close