Publication | Closed Access
Modeling the behavior of users who are confronted with security mechanisms
34
Citations
36
References
2011
Year
Security ModellingComputational Social ScienceBehavioral SciencesEngineeringSecurity ManagementUsable SecurityInformation SecuritySecurity MechanismsSocial ComputingSecurity AwarenessSecurityComputer ScienceCommunicationComputer Security ModelData Security
| Year | Citations | |
|---|---|---|
Page 1
Page 1