Sciweavers

2648 search results - page 83 / 530
» Human Factors In Computer Security
Sort
View
CIVR
2009
Springer
229views Image Analysis» more  CIVR 2009»
15 years 4 months ago
A human-machine collaborative approach to tracking human movement in multi-camera video
Although the availability of large video corpora are on the rise, the value of these datasets remain largely untapped due to the difficulty of analyzing their contents. Automatic ...
Philip DeCamp, Deb Roy
MOBIWAC
2009
ACM
15 years 4 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
WWW
2006
ACM
15 years 10 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
CCS
2009
ACM
15 years 10 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
ICSE
2008
IEEE-ACM
15 years 10 months ago
Continuous coordination within the context of cooperative and human aspects of software engineering
We have developed software tools that aim to support the cooperative software engineering tasks and promote an awareness of social dependencies that is essential to successful coo...
André van der Hoek, Anita Sarma, Ban Al-Ani...