Login / Signup
Sonifying Internet Security Threats.
Akbar Siami Namin
Rattikorn Hewett
Keith S. Jones
Rona L. Pogrund
Published in:
CHI Extended Abstracts (2016)
Keyphrases
</>
security threats
security mechanisms
security issues
key management
resource constrained
security risks
access control
operating system
databases
smart card
information security
security requirements
real time
data sets
response time