Sciweavers

274 search results - page 17 / 55
» Security user studies: methodologies and best practices
Sort
View
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 4 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
NORDICHI
2006
ACM
15 years 3 months ago
More than meets the eye: an exploratory study of context photography
In context photography, sensors gather real-time context information, which visually affects a photograph as it is taken. We have implemented a prototype running on standard camer...
Maria Håkansson, Lalya Gaye, Sara Ljungblad,...
SMC
2007
IEEE
108views Control Systems» more  SMC 2007»
15 years 4 months ago
Cybersecurity for electric power control and automation systems
—Disruption of electric power operations can be catastrophic on the national security and economy. Due to the complexity of widely dispersed assets and the interdependency betwee...
Chee-Wooi Ten, Manimaran Govindarasu, Chen-Ching L...
ISSTA
2012
ACM
13 years 5 days ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
ECRIME
2007
15 years 1 months ago
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...