Identifying infected users via network traffic
There has been increasing interest in deeper understandings of users and user behavior to
tailor and strengthen cybersecurity. Just as in the field of medicine where symptoms of a …
tailor and strengthen cybersecurity. Just as in the field of medicine where symptoms of a …
Continuous identification in smart environments using wrist-worn inertial sensors
AS Guinea, A Boytsov, L Mouline… - Proceedings of the 15th …, 2018 - dl.acm.org
In this paper, we propose a new approach capable of performing continuous identification of
users in home and office environments based on hand and arm motion patterns obtained …
users in home and office environments based on hand and arm motion patterns obtained …
'Staged for Living' Negotiating Objects and their Values over a Porous Boundary
We describe more than 19 months of ethnographic fieldwork with people who have
embraced minimalism, a lifestyle movement focused on reducing modern life's clutter. We …
embraced minimalism, a lifestyle movement focused on reducing modern life's clutter. We …
Securing edge networks with securebox
The number of mobile and IoT devices connected to home and enterprise networks is
growing fast. These devices offer new services and experiences for the users; however, they …
growing fast. These devices offer new services and experiences for the users; however, they …
Engineering Smart Software Services for Intelligent Pervasive Systems
A Sanchez Guinea - 2018 - orbilu.uni.lu
[en] Pervasive computing systems, envisioned as systems that blend with the physical
environment to enhance the quality of life of its users, are rapidly becoming a not so distant …
environment to enhance the quality of life of its users, are rapidly becoming a not so distant …
[图书][B] Making Values Explicit in the Design of Emerging Technologies
EJ Cheon - 2020 - search.proquest.com
Values in and around technologies have, indirectly and directly, always been a concern for
researchers and practitioners of human-computer interaction (HCI). Indirectly, HCI scholars …
researchers and practitioners of human-computer interaction (HCI). Indirectly, HCI scholars …
Managing configuration history in domestic networks
R Spencer - 2018 - eprints.nottingham.ac.uk
Domestic Networks are gaining in complexity, with an increasing number and variety of
devices. Increasing complexity results in greater difficulty managing configuration and …
devices. Increasing complexity results in greater difficulty managing configuration and …
Quantifying and Predicting User Reputation in a Network Security Context
MS Gratian - 2019 - search.proquest.com
Reputation has long been an important factor for establishing trust and evaluating the
character of others. Though subjective by definition, it recently emerged in the field of …
character of others. Though subjective by definition, it recently emerged in the field of …
[PDF][PDF] Domesticating home networks
A Brown - 2016 - core.ac.uk
This thesis addresses the following question: How should domestic networks be reinvented
to support self-management by domestic users? It takes a user-centred design approach to …
to support self-management by domestic users? It takes a user-centred design approach to …