{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:06:10Z","timestamp":1743123970607,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_17","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"251-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems"],"prefix":"10.1007","author":[{"given":"Haiyue","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Patrice","family":"Rusconi","sequence":"additional","affiliation":[]},{"given":"Nouf","family":"Aljaffan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"ACT-R Research Group: ACT-R (2016). http:\/\/act-r.psy.cmu.edu\/. Accessed 25 Aug 2016","DOI":"10.1002\/ir.20201"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-662-47854-7_16","volume-title":"Financial Cryptography and Data Security","author":"A Al Galib","year":"2015","unstructured":"Al Galib, A., Safavi-Naini, R.: User authentication using human cognitive abilities. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 254\u2013271. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-47854-7_16"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"17_CR4","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195324259.001.0001","volume-title":"How Can the Human Mind Occur in the Physical Universe?","author":"JR Anderson","year":"2007","unstructured":"Anderson, J.R.: How Can the Human Mind Occur in the Physical Universe?. Oxford University Press, Oxford (2007)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-319-08786-3_2","volume-title":"User Modeling, Adaptation, and Personalization","author":"M Belk","year":"2014","unstructured":"Belk, M., Germanakos, P., Fidas, C., Samaras, G.: A personalization method based on human factors for improving usability of user authentication tasks. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, G.-J. (eds.) UMAP 2014. LNCS, vol. 8538, pp. 13\u201324. Springer, Cham (2014). doi:10.1007\/978-3-319-08786-3_2"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1006\/ijhc.2001.0469","volume":"55","author":"MD Byrne","year":"2001","unstructured":"Byrne, M.D.: ACT-R\/PM and menu selection: applying a cognitive architecture to HCI. Int. J. Hum. Comput. Stud. 55(1), 41\u201384 (2001)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Byrne, M.D., Anderson, J.R., Douglass, S., Matessa, M.: Eye tracking the visual search of click-down menus. In: Proceedings of 1999 SIGCHI Conference on Human Factors in Computing Systems, CHI 1999, pp. 402\u2013409. ACM (1999)","DOI":"10.1145\/302979.303118"},{"issue":"7","key":"17_CR8","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/358886.358895","volume":"23","author":"SK Card","year":"1980","unstructured":"Card, S.K., Moran, T.P., Newell, A.: The keystroke-level model for user performance time with interactive systems. Commun. ACM 23(7), 396\u2013410 (1980)","journal-title":"Commun. ACM"},{"key":"17_CR9","volume-title":"The Psychology of Human-Computer Interaction","author":"SK Card","year":"1983","unstructured":"Card, S.K., Newell, A., Moran, T.P.: The Psychology of Human-Computer Interaction. L. Erlbaum Associates Inc., Hillsdale (1983)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Duermuth, M., Golla, M., Deniz, F.: Towards implicit visual memory-based authentication. In: Proceedings of 2017 Network and Distributed System Security Symposium (NDSS 2017). Internet Society (2017)","DOI":"10.14722\/ndss.2017.23292"},{"key":"17_CR11","unstructured":"Cavoukian, A., Dixon, M.: Privacy and security by design: an enterprise architecture approach. Online white paper (2013). https:\/\/www.ipc.on.ca\/wp-content\/uploads\/Resources\/pbd-privacy-and-security-by-design-oracle.pdf"},{"issue":"2","key":"17_CR12","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1207\/s15327051hci2102_1","volume":"21","author":"MD Fleetwood","year":"2008","unstructured":"Fleetwood, M.D., Byrne, M.D.: Modeling the visual search of displays: a revised ACT-R model of icon search based on eye-tracking data. Hum.-Comput. Interact. 21(2), 153\u2013197 (2008)","journal-title":"Hum.-Comput. Interact."},{"issue":"3","key":"17_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1207\/s15327051hci0803_3","volume":"8","author":"WD Gray","year":"1993","unstructured":"Gray, W.D., John, B.E., Atwood, M.E.: Project ernestine: validating a GOMS analysis for predicting and explaining real-world task performance. Hum. Comput. Interact. 8(3), 237\u2013309 (1993)","journal-title":"Hum. Comput. Interact."},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1207\/s15327051hci1903_1","volume":"10","author":"AJ Hornof","year":"2004","unstructured":"Hornof, A.J.: Cognitive strategies for the visual search of hierarchical computer displays. Hum.-Comput. Interact. 10(3), 183\u2013223 (2004)","journal-title":"Hum.-Comput. Interact."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Hornof, A.J., Halverson, T.: Cognitive strategies and eye movements for searching hierarchical computer displays. In: Proceedings of 2003 SIGCHI Conference on Human Factors in Computing Systems (CHI 2003), pp. 249\u2013256. ACM (2003)","DOI":"10.1145\/642611.642656"},{"key":"17_CR16","unstructured":"John, B.E.: CogTool (2016). https:\/\/cogtool.com\/. Accessed 25 Aug 2016"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1145\/235833.236054","volume":"3","author":"BE John","year":"1996","unstructured":"John, B.E., Kieras, D.E.: The GOMS family of user interface analysis techniques: comparison and contrast. ACM Trans. Comput.-Hum. Interact. 3(4), 320\u2013351 (1996)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"John, B.E., Prevas, K., Salvucci, D.D., Koedinger, K.: Predictive human performance modeling made easy. In: Proceedings of 2004 SIGCHI Conference on Human Factors in Computing Systems (CHI 2004), pp. 455\u2013462. ACM (2004)","DOI":"10.1145\/985692.985750"},{"key":"17_CR19","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-41671-2_21","volume-title":"Ubiquitous Information Technologies and Applications","author":"S Kim","year":"2014","unstructured":"Kim, S., Yi, H., Yi, J.H.: FakePIN: dummy key based mobile user authentication scheme. In: Jeong, Y.-S., Park, Y.-H., Hsu, C.-H.R., Park, J.J.J.H. (eds.) Ubiquitous Information Technologies and Applications. LNEE, vol. 280, pp. 157\u2013164. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-41671-2_21"},{"issue":"6","key":"17_CR20","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TSMC.2013.2270227","volume":"44","author":"T Kwon","year":"2014","unstructured":"Kwon, T., Shin, S., Na, S.: Covert attentional shoulder surfing: human adversaries are more powerful than expected. IEEE Trans. Syst. Man Cybern.: Syst. 44(6), 716\u2013727 (2014)","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"key":"17_CR21","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7688.001.0001","volume-title":"The Soar Cognitive Architecture","author":"JE Laird","year":"2012","unstructured":"Laird, J.E.: The Soar Cognitive Architecture. MIT Press, Cambridge (2012)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-319-26555-1_26","volume-title":"Neural Information Processing","author":"D Miyamoto","year":"2015","unstructured":"Miyamoto, D., Blanc, G., Kadobayashi, Y.: Eye can tell: on the correlation between eye movement and phishing identification. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9491, pp. 223\u2013232. Springer, Cham (2015). doi:10.1007\/978-3-319-26555-1_26"},{"key":"17_CR23","unstructured":"Patton, E.W.: The stochastic activity network laboratory for cognitive modeling (SANLab-CM) (2012). https:\/\/github.com\/CogWorks\/SANLab-CM\/. Accessed 25 Aug 2016"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Perkovi\u0107, T., Li, S., Mumtaz, A., Khayam, S.A., Javed, Y., \u010cagalj, M.: Breaking undercover: exploiting design flaws and nonuniform human behavior. In: Proceedings of 2011 7th Symposium on Usable Privacy and Security (SOUPS 2011). ACM (2011)","DOI":"10.1145\/2078827.2078834"},{"issue":"11","key":"17_CR25","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1016\/S0042-6989(02)00040-8","volume":"42","author":"RPN Rao","year":"2002","unstructured":"Rao, R.P.N., Zelinsky, G.J., Hayhoe, M.M., Ballard, D.H.: Eye movements in iconic visual search. Vis. Res. 42(11), 1447\u20131463 (2002)","journal-title":"Vis. Res."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Salvucci, D.D.: Predicting the effects of in-car interfaces on driver behavior using a cognitive architecture. In: Proceedings of 2001 SIGCHI Conference on Human Factors in Computing Systems (CHI 2001), pp. 120\u2013127. ACM (2001)","DOI":"10.1145\/365024.365064"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. In: Proceedings of 2008 SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), pp. 183\u2013192. ACM (2008)","DOI":"10.1145\/1357054.1357085"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-319-07308-8_23","volume-title":"Cross-Cultural Design","author":"MA Sasse","year":"2014","unstructured":"Sasse, M.A., Steves, M., Krol, K., Chisnell, D.: The great authentication fatigue \u2013 and how to overcome it. In: Patrick Rau, P.L. (ed.) CCD 2014. LNCS, vol. 8528, pp. 228\u2013239. Springer, Cham (2014). doi:10.1007\/978-3-319-07308-8_23"},{"key":"17_CR29","unstructured":"Soar Research Groups: Soar cognitive architecture (2016). http:\/\/soar.eecs.umich.edu\/. Accessed 18 Sept 2016"},{"issue":"1","key":"17_CR30","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1037\/0033-295X.112.1.159","volume":"112","author":"R Sun","year":"2005","unstructured":"Sun, R., Slusarz, P., Terry, C.: The interaction of the explicit and the implicit in skill learning: a dual-process approach. Psychol. Rev. 112(1), 159\u2013192 (2005)","journal-title":"Psychol. Rev."},{"key":"17_CR31","unstructured":"The MITRE Corporation: A cognitive modeling calculator (2014). http:\/\/cogulator.io\/. Accessed 25 Aug 2016"},{"key":"17_CR32","unstructured":"Tobii AB: Tobii EyeX (2016). http:\/\/www.tobii.com\/xperience\/products\/. Accessed 25 Aug 2016"},{"issue":"3","key":"17_CR33","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TIFS.2014.2376177","volume":"10","author":"M \u010cagalj","year":"2015","unstructured":"\u010cagalj, M., Perkovi\u0107, T., Bugari\u0107, M.: Timing attacks on cognitive authentication schemes. IEEE Trans. Inf. Forensics Secur. 10(3), 584\u2013596 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:56:42Z","timestamp":1625104602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}