Identifying infected users via network traffic

M Gratian, D Bhansali, M Cukier, J Dykstra - Computers & Security, 2019 - Elsevier
There has been increasing interest in deeper understandings of users and user behavior to
tailor and strengthen cybersecurity. Just as in the field of medicine where symptoms of a …

Continuous identification in smart environments using wrist-worn inertial sensors

AS Guinea, A Boytsov, L Mouline… - Proceedings of the 15th …, 2018 - dl.acm.org
In this paper, we propose a new approach capable of performing continuous identification of
users in home and office environments based on hand and arm motion patterns obtained …

'Staged for Living' Negotiating Objects and their Values over a Porous Boundary

EJ Cheon, NM Su - Proceedings of the ACM on Human-Computer …, 2018 - dl.acm.org
We describe more than 19 months of ethnographic fieldwork with people who have
embraced minimalism, a lifestyle movement focused on reducing modern life's clutter. We …

Securing edge networks with securebox

I Hafeez, AY Ding, S Tarkoma - arXiv preprint arXiv:1712.07740, 2017 - arxiv.org
The number of mobile and IoT devices connected to home and enterprise networks is
growing fast. These devices offer new services and experiences for the users; however, they …

Engineering Smart Software Services for Intelligent Pervasive Systems

A Sanchez Guinea - 2018 - orbilu.uni.lu
[en] Pervasive computing systems, envisioned as systems that blend with the physical
environment to enhance the quality of life of its users, are rapidly becoming a not so distant …

[图书][B] Making Values Explicit in the Design of Emerging Technologies

EJ Cheon - 2020 - search.proquest.com
Values in and around technologies have, indirectly and directly, always been a concern for
researchers and practitioners of human-computer interaction (HCI). Indirectly, HCI scholars …

Managing configuration history in domestic networks

R Spencer - 2018 - eprints.nottingham.ac.uk
Domestic Networks are gaining in complexity, with an increasing number and variety of
devices. Increasing complexity results in greater difficulty managing configuration and …

Quantifying and Predicting User Reputation in a Network Security Context

MS Gratian - 2019 - search.proquest.com
Reputation has long been an important factor for establishing trust and evaluating the
character of others. Though subjective by definition, it recently emerged in the field of …

[PDF][PDF] Domesticating home networks

A Brown - 2016 - core.ac.uk
This thesis addresses the following question: How should domestic networks be reinvented
to support self-management by domestic users? It takes a user-centred design approach to …