Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity
Domínguez, I. X., Goodwin, P. R., Roberts, D. L., & Amant, R. S. (2016, October 3). International Journal of Human-Computer Interaction, Vol. 33, pp. 44–54.
topics (OpenAlex): Cognitive Computing and Networks; Cognitive Science and Mapping; Personal Information Management and User Behavior
TL;DR:
An emerging direction in the intersection between human–computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity (cyber-SA) is described.
(via
Semantic Scholar)
Sources: Web Of Science, NC State University Libraries