Sciweavers

2564 search results - page 40 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
SIGCOMM
2009
ACM
15 years 6 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
DPPI
2007
ACM
15 years 3 months ago
How interface agents affect interaction between humans and computers
Abstract. For many years, the HCI community has harbored a vision of interacting with intelligent, embodied computer agents. However, the reality of this vision remains elusive. Fr...
Jodi Forlizzi, John Zimmerman, Vince Mancuso, Sony...
DSN
2006
IEEE
15 years 5 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
TRIDENTCOM
2005
IEEE
15 years 5 months ago
A Testbed for Evaluating Human Interaction with Ubiquitous Computing Environments
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
SECURWARE
2008
IEEE
15 years 6 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin