Articles

Sort by
Previous Page Page 1 of 6 Next Page
  1. Research

    An investigation into users’ considerations towards using password managers

    Password managers, though commonly recommended by security experts, are still not used by many users. Understanding why some choose to use password managers while others do not is important towards generally u...

    Michael Fagan, Yusuf Albayram, Mohammad Maifi Hasan Khan and Ross Buck

    Human-centric Computing and Information Sciences 2017 7:12

    Published on: 15 March 2017

  2. Research

    An enhanced security framework for home appliances in smart home

    Since the end of 2000, smartphones have explosively spread and have made people’s lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and sm...

    Won Min Kang, Seo Yeon Moon and Jong Hyuk Park

    Human-centric Computing and Information Sciences 2017 7:6

    Published on: 5 March 2017

  3. Research

    A survey of cloud-based network intrusion detection analysis

    As network traffic grows and attacks become more prevalent and complex, we must find creative new ways to enhance intrusion detection systems (IDSes). Recently, researchers have begun to harness both machine l...

    Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolato, Byunggu Yu and Dong Hyun Jeong

    Human-centric Computing and Information Sciences 2016 6:19

    Published on: 5 December 2016

  4. Research

    Plausible mass-spring system using parallel computing on mobile devices

    Recently the hardware performance of mobile devices have been extremely increased and advanced mobile devices provide multi-cores and high clock speed. In addition, mobile devices have advantages in mobility a...

    Min Hong, Jae-Hong Jeon, Hyo-Sub Yum and Seung-Hyun Lee

    Human-centric Computing and Information Sciences 2016 6:23

    Published on: 28 November 2016

  5. Research

    Evaluation of a channel assignment scheme in mobile network systems

    The channel assignment problem is a complex problem which requires that under certain constraints a minimum number of channels have to be assigned to mobile calls in the wireless mobile system. In this paper, ...

    Nahla Nurelmadina, Ibtehal Nafea and Muhammad Younas

    Human-centric Computing and Information Sciences 2016 6:21

    Published on: 10 November 2016

  6. Research

    Design and implement chords and personal windows for multi-user collaboration on a large multi-touch vertical display

    Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located co...

    Ioannis Leftheriotis, Konstantinos Chorianopoulos and Letizia Jaccheri

    Human-centric Computing and Information Sciences 2016 6:14

    Published on: 10 September 2016

  7. Research

    Ontology mapping and semantics of web interface signs

    Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of c...

    Muhammad Nazrul Islam and A. K. M. Najmul Islam

    Human-centric Computing and Information Sciences 2016 6:20

    Published on: 8 September 2016

  8. Review

    An investigation of unpaid crowdsourcing

    The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accompl...

    Ria Mae Borromeo and Motomichi Toyama

    Human-centric Computing and Information Sciences 2016 6:11

    Published on: 5 August 2016

  9. Research

    Intelligent phishing url detection using association rule mining

    Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk...

    S. Carolin Jeeva and Elijah Blessing Rajsingh

    Human-centric Computing and Information Sciences 2016 6:10

    Published on: 10 July 2016

Previous Page Page 1 of 6 Next Page