Can Eye-Tracking be used in Cyber Security Operations?
Author(s) / Creator(s)
Ertam, Fatih
Abstract / Description
Abstract and Presentation at the MultiplEYE Mid-Term Conference (MuMiCo) 2024
Keyword(s)
eyetrackingPersistent Identifier
Date of first publication
2024-10-07
Is part of
MultiplEYE Mid-Term Conference 2024, Tirana, Albania
Publisher
PsychArchives
Citation
-
MuMiCo24_Abstract_Ertam_Cyber_Security.pdfAdobe PDF - 107.15KBMD5: 307ee9aa6645220b97af107a80cb2206
-
MuMiCo24_Presentation_Ertam_Cyber_Security.pdfAdobe PDF - 875.6KBMD5: 389aba65ad2023e931565581480ebdff
-
There are no other versions of this object.
-
Author(s) / Creator(s)Ertam, Fatih
-
PsychArchives acquisition timestamp2024-10-07T10:53:53Z
-
Made available on2024-10-07T10:53:53Z
-
Date of first publication2024-10-07
-
Abstract / DescriptionAbstract and Presentation at the MultiplEYE Mid-Term Conference (MuMiCo) 2024en
-
Publication statusunknown
-
Review statusunknown
-
Persistent Identifierhttps://hdl.handle.net/20.500.12034/10912
-
Persistent Identifierhttps://doi.org/10.23668/psycharchives.15486
-
Language of contenteng
-
PublisherPsychArchives
-
Is part ofMultiplEYE Mid-Term Conference 2024, Tirana, Albania
-
Is related tohttps://multipleye.eu/multipleye-midterm-conference/
-
Keyword(s)eyetracking
-
Dewey Decimal Classification number(s)150
-
TitleCan Eye-Tracking be used in Cyber Security Operations?en
-
DRO typeconferenceObject
-
Visible tag(s)MuMiCo2024