User detection of threats with different security measures | IEEE Conference Publication | IEEE Xplore