- 1 DeAlvare, A.M. A framework for password selection. In Proceedings of Unix Security Workshop II. (Portland, Aug. 29-30, 1998).Google Scholar
- 2 DeAlvare, A.M. How crackers crack passwords or what passwords to avoid. In Proceedings of Unix Security Workshop II. (Portland, 1990).Google Scholar
- 3 Davis, C. and Ganesan, R. BApasswd: A new proactive password checker. In Proceedings of the National Computer Security Conference '93, the 16th NIST/NSA conference. 1993, 1-15.Google Scholar
- 4 Davis, D. and Price, W. Security for Computer Networks. Wiley, Chich-ester, 1987.Google Scholar
- 5 FIPS. Password Usage. Federal Information Processing Standards Pub-lication. May 30, 1985.Google Scholar
- 6 Ford, W. Computer Communications Security: Principles, Standard Pro-tocols and Techniques. Prentice Hall, NJ, 1994. Google ScholarDigital Library
- 7 Gordon, S. Social Engineering: Techniques and Prevention. Computer Security, 1995Google Scholar
- 8 Hitchings, J. Deficiencies of the traditional approach to information security and the requirements for a new methodology. Computers and Security, 14, 1995, 377-383.Google ScholarDigital Library
- 9 Parker, D.B. Restating the foundation of information security. In G.C. Gable and W.J. Caelli, Eds., IT Security: The Need for International Co-operation. Elsevier Science Publishers, Holland, 1992. Google ScholarDigital Library
- 10 Strauss, A. and Corbin, J. Basics of Qualitative Research: Grounded The-ory Procedures and Techniques. Sage, Newbury Park, 1990.Google Scholar
- 11 Wickens, C.D. Engineering Psychology and Human Performance, 2d ed. Harper Collins, NY, 1992.Google Scholar
Index Terms
- Users are not the enemy
Recommendations
Predicting enemy force closure with simulation
WSC '00: Proceedings of the 32nd conference on Winter simulationThis paper presents a model and an analysis done to predict enemy force closure. The simulation replaces a pencil and ruler method that has been used by Department of Defense planners for over a century. More importantly, the model provides planners ...
The user is not the enemy: fighting malware by tracking user intentions
NSPW '08: Proceedings of the 2008 New Security Paradigms WorkshopCurrent access control policies provide no mechanisms for incorporating user behavior in access control decisions, even though the way a user interacts with a program often indicates what the user expects that program to do. We develop a new approach to ...
Mitigating Skill Decay in Military Instruction and Enemy Analysis via GIFT
Augmented Cognition: Users and ContextsAbstractThis paper will review the collaborative effort of the Army Research Laboratory (ARL) and the Department of Military Instruction (DMI) at the United States Military Academy (USMA) to develop and execute a pedagogical pathway to validate the ...
Comments