In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Abstract. For many years, the HCI community has harbored a vision of interacting with intelligent, embodied computer agents. However, the reality of this vision remains elusive. Fr...
Jodi Forlizzi, John Zimmerman, Vince Mancuso, Sony...
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...