usenix conference policies
You are here
Home ยป On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned
Abstract:
BibTeX
@inproceedings {266603,
author = {Malek Ben Salem and Salvatore J. Stolfo},
title = {On the Design and Execution of {Cyber-Security} User Studies: Methodology, Challenges, and Lessons Learned},
booktitle = {4th Workshop on Cyber Security Experimentation and Test (CSET 11)},
year = {2011},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/cset11/design-and-execution-cyber-security-user-studies-methodology-challenges-and},
publisher = {USENIX Association},
month = aug
}
author = {Malek Ben Salem and Salvatore J. Stolfo},
title = {On the Design and Execution of {Cyber-Security} User Studies: Methodology, Challenges, and Lessons Learned},
booktitle = {4th Workshop on Cyber Security Experimentation and Test (CSET 11)},
year = {2011},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/cset11/design-and-execution-cyber-security-user-studies-methodology-challenges-and},
publisher = {USENIX Association},
month = aug
}
Links
Paper (HTML):
connect with us