{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:32:54Z","timestamp":1769722374732,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813660","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"479-491","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings"],"prefix":"10.1145","author":[{"given":"Ajaya","family":"Neupane","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Md. Lutfor","family":"Rahman","sequence":"additional","affiliation":[{"name":"Aegis Foundry LLC, Birmingham, AL, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Leanne","family":"Hirshfield","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"B-Alert X-10 Set-Up Manual. http:\/\/www.biopac.com\/Manuals\/b-alert%20x10%20setup.pdf.  B-Alert X-10 Set-Up Manual. http:\/\/www.biopac.com\/Manuals\/b-alert%20x10%20setup.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Emotiv EEG Headset. http:\/\/emotiv.com\/.  Emotiv EEG Headset. http:\/\/emotiv.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.pewinternet.org\/data-trend\/internet-use\/latest-stats\/. {Online","author":"Demographics Internet Users","year":"2015"},{"key":"e_1_3_2_1_4_1","unstructured":"Lumosity. www.lumosity.com .  Lumosity. www.lumosity.com ."},{"key":"e_1_3_2_1_5_1","unstructured":"MindAscend. www.mindascend.com .  MindAscend. www.mindascend.com ."},{"key":"e_1_3_2_1_6_1","unstructured":"Neurosky. http:\/\/neurosky.com\/ .  Neurosky. http:\/\/neurosky.com\/ ."},{"key":"e_1_3_2_1_7_1","unstructured":"SMI Eye-Tracking Glasses. http:\/\/eyetracking-glasses.com\/ .  SMI Eye-Tracking Glasses. http:\/\/eyetracking-glasses.com\/ ."},{"key":"e_1_3_2_1_8_1","unstructured":"Tobi Gaze Glass. http:\/\/www.tobii.com\/en\/eye-tracking-research\/global\/landingpages\/tobii-glasses-2\/.  Tobi Gaze Glass. http:\/\/www.tobii.com\/en\/eye-tracking-research\/global\/landingpages\/tobii-glasses-2\/."},{"key":"e_1_3_2_1_9_1","first-page":"257","volume-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)","author":"Akhawe Devdatta","year":"2013"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435362"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1702_3"},{"key":"e_1_3_2_1_12_1","volume-title":"Eeg correlates of task engagement and mental workload in vigilance, learning, and memory tasks. Aviation, space, and environmental medicine, 78(Supplement 1):B231--B244","author":"Berka C.","year":"2007"},{"key":"e_1_3_2_1_13_1","first-page":"90","volume-title":"Defense and security","author":"Berka C.","year":"2005"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702322"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10608-007-9119-0"},{"key":"e_1_3_2_1_16_1","volume-title":"Anxiety-related attentional biases and their regulation by attentional control. Journal of abnormal psychology, 111(2):225","author":"Derryberry D.","year":"2002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506577"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31454-4_5"},{"key":"e_1_3_2_1_22_1","volume-title":"Human cortical activity evoked by the assignment of authenticity when viewing works of art. Frontiers in human neuroscience, 5","author":"Huang M.","year":"2011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsycho.2011.03.003"},{"key":"e_1_3_2_1_24_1","volume-title":"Ten simple rules for designing erp experiments. Event-related potentials: A methods handbook, 262083337","author":"Luck S. J.","year":"2005"},{"key":"e_1_3_2_1_25_1","first-page":"143","volume-title":"USENIX Security Symposium","author":"Martinovic I.","year":"2012"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23056"},{"key":"e_1_3_2_1_27_1","volume-title":"Factor structure of the Barratt impulsiveness scale. Journal of clinical psychology, (51):768--74","author":"Patton J. H.","year":"1995"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the SIGCHI conference on Human Factors in computing systems","author":"Portnoff R. S.","year":"2015"},{"key":"e_1_3_2_1_29_1","volume-title":"Correlation between expected workload and eeg indices of cognitive workload and task engagement","author":"Poythress M.","year":"2006"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/355017.355028"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_34_1","first-page":"399","volume-title":"USENIX Security Symposium","author":"Sunshine J.","year":"2009"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0707678104"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00375"},{"key":"e_1_3_2_1_37_1","first-page":"137","volume-title":"Proceedings of Graphics Interface 2005","author":"Whalen T.","year":"2005"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03196680"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":39,"alternative-id":["10.1145\/2810103.2813660","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813660","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}