2016 article

Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity

Domínguez, I. X., Goodwin, P. R., Roberts, D. L., & Amant, R. S. (2016, October 3). International Journal of Human-Computer Interaction, Vol. 33, pp. 44–54.

By: I. Domínguez n, P. Goodwin n, D. Roberts n & R. Amant n

topics (OpenAlex): Cognitive Computing and Networks; Cognitive Science and Mapping; Personal Information Management and User Behavior
TL;DR: An emerging direction in the intersection between human–computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity (cyber-SA) is described. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.