A Survey of Security and Privacy in Connected Vehicles, Wireless Sensor Networks (WSN) For Vehicular and Space Applications: Architecture and Implementation ,
DOI : 10.1007/978-1-4939-2468-4_10
What is a public information system, International Journal of Public Information Systems, vol.1, issue.1, pp.81-99, 2005. ,
A note on the denial-of-service problem, Proceedings of the 1983 IEEE Symposium on Security and Privacy. SP '83, pp.5101-5111, 1983. ,
Glossary of key information security terms, 2011. ,
Security Engineering: A Guide to Building Dependable Distributed Systems. 2 edn, 2008. ,
iSEC partners presents: The hacked and the furious, 2012. ,
Keyloggers: How they work and how to detect them (part 1) http://www.securelist.com/en/analysis, p.1, 2012. ,
The web means the end of forgetting. The New York Times, 2010. ,
ecall: Time saved = lives saved, 2011. ,
Bosch health buddy, 2013. ,
http://sgrenovation.com/why-use-smart-home-appliances, 2013. ,
Twitter logo, 2013. ,
Playstore logo. https://play.google.com/store?hl=en, 2013. ,
Android logo, 2013. ,
What does security culture look like for small organizations? In: 7th Australian Information Security Management Conference, 2009. ,
Phishing for user security awareness, Computers & Security, vol.26, issue.1, pp.73-80, 2007. ,
DOI : 10.1016/j.cose.2006.10.009
Information Security Culture, Proc. of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives. SEC '02, pp.191-202, 2002. ,
DOI : 10.1007/978-0-387-35586-3_15
Security Paradigm in Ubiquitous Computing, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.634-638, 2012. ,
DOI : 10.1109/IMIS.2012.192
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.129-142, 2008. ,
DOI : 10.1109/SP.2008.31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.453.4132
Comprehensive experimental analyses of automotive attack surfaces, Proceedings of the 20th USENIX conference on Security. SEC'11, pp.6-6, 2011. ,
Why Johnny can't encrypt: a usability evaluation of pgp 5.0, Proceedings of the 8th conference on USENIX Security Symposium - Volume 8. SSYM'99, pp.14-14, 1999. ,
Usable Security: What is it? How do we get it? In: Security and Usability: Designing secure systems that people can use, pp.13-30, 2005. ,
2012 ncsa/mcafee online safety survey, 2012. ,
Internet Security Glossary, Version 2, RFCInformational), vol.4949, 2007. ,
DOI : 10.17487/rfc4949
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.4200
Embedding information security culture emerging concerns and challenges, Pacific Asia Conference on Information Systems, 2010. ,
DOI : 10.4018/ijcwt.2015040103
URL : https://ujcontent.uj.ac.za/vital/access/services/Download/uj:8610/CONTENT1
Security awareness: switch to a better programme, Network Security, vol.2006, issue.2, pp.15-18, 2006. ,
DOI : 10.1016/S1353-4858(06)70337-3
A prototype for assessing information security awareness, Computers & Security, vol.25, issue.4, pp.289-296, 2006. ,
DOI : 10.1016/j.cose.2006.02.008
Power relationships in information systems security policy formulation and implementation, Proc. 16th European Conference on Information Systems, pp.1358-1369, 2008. ,
Employees' Behavior towards IS Security Policy Compliance, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp.156-156, 2007. ,
DOI : 10.1109/HICSS.2007.206
A video game for cyber security training and awareness, Computers & Security, vol.26, issue.1, pp.63-72, 2007. ,
DOI : 10.1016/j.cose.2006.10.005