Search
for Author
All Reviews
Herley, Cormac
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
2
of
2
reviews
Security, cybercrime, and scale
Herley C. Communications of the ACM 57(9): 64-71, 2014. Type: Article
This article analyzes the traditional threat model for cybersecurity and proposes a new model that considers scalability and financial motivation. In the new threat model, the author splits cybercrime into two categories: financial and...
...
Sep 30 2014
Does my password go up to eleven?: The impact of password meters on password selection
Egelman S., Sotirakopoulos A., Muslukhov I., Beznosov K., Herley C. CHI 2013 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 2379-2388, 2013. Type: Proceedings
Unrelenting exploits of security loopholes to steal passwords in enterprise systems require attention. Egelman and others investigate whether users create stronger passwords in the presence of relative strength meters, no meters, or tr...
...
Mar 12 2014
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy