Sciweavers

694 search results - page 94 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
EUROSYS
2011
ACM
14 years 3 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
ICC
2007
IEEE
269views Communications» more  ICC 2007»
15 years 6 months ago
A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks
–The many-to-one traffic pattern dominates in sensor networks, where a large number of sensor nodes send data to one sink. A sensor node may only communicate with a small portion...
Xiaojiang Du, Yang Xiao, Song Ci, Mohsen Guizani, ...
EUROSEC
2010
ACM
15 years 5 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
CRITIS
2009
15 years 28 days ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
WWW
2004
ACM
16 years 15 days ago
Smartback: supporting users in back navigation
This paper presents the design and user evaluation of SmartBack, a feature that complements the standard Back button by enabling users to jump directly to key pages in their navig...
Natasa Milic-Frayling, Rachel Jones, Kerry Rodden,...