Sign in

Modeling the behavior of users who are confronted with security mechanisms.

Sebastian MöllerNoam Ben-AsherKlaus-Peter EngelbrechtRoman EnglertJoachim Meyer
Published in: Comput. Secur. (2011)
Keyphrases