Sciweavers

694 search results - page 68 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ISI
2004
Springer
15 years 5 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
CHI
2009
ACM
16 years 13 days ago
City browser: developing a conversational automotive HMI
This paper introduces City Browser, a prototype multimodal, conversational, spoken language interface for automotive navigational aid and information access. A study designed to e...
Alexander Gruenstein, Bruce Mehler, Bryan Reimer, ...
BCSHCI
2007
15 years 1 months ago
From HCI to media experience: methodological implications
The landscape of interactive technology design and evaluation is expanding. In the past, usability and task efficiency were the main focus for research in human computer interacti...
Elizabeth F. Churchill, Jeffrey Bardzell
ACSAC
2009
IEEE
15 years 6 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
SENSYS
2005
ACM
15 years 5 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...