" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication

P Markert, T Schnitzler, M Golla… - Eighteenth Symposium on …, 2022 - usenix.org
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …

The role of professional product reviewers in evaluating security and privacy

W Guo, J Walter, ML Mazurek - 32nd USENIX Security Symposium …, 2023 - usenix.org
Consumers who use Internet-connected products are often exposed to security and privacy
vulnerabilities that they lack time or expertise to evaluate themselves. Can professional …

The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …

Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature

X Hou, N Omar, J Wang - Frontiers in Psychology, 2022 - frontiersin.org
The advent of the intelligence age has injected new elements into the development of
literature. The synergic modification of Anglo-American (AAL) traumatic narrative (TN) …

On the evaluation of usability design guidelines for improving network monitoring tools interfaces

SAM Silveira, LAM Zaina, LN Sampaio… - Journal of Systems and …, 2022 - Elsevier
Network monitoring tools are vital to network administrators, helping them make decisions
and accomplish their tasks. In general, those tools are developed with a focus on technical …

[PDF][PDF] “As soon as it'sa risk, I want to require MFA”: How Administrators Configure Risk-based Authentication (Extended Version)

P Markert, T Schnitzler, M Golla, M Dürmuth - 2022 - theodorschnitzler.com
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …

[PDF][PDF] Network operator intent: a basis for user-friendly network configuration and analysis

A Curtis-Black - 2021 - ir.canterbury.ac.nz
Two important network management activities are configuration (making the network behave
in a desirable way) and analysis (querying the network's state). A challenge common to …

End User Study of an Engineering Design Tool

I Johnson, AS Eriksson - 2023 - gupea.ub.gu.se
[Context and Motivation] PROSIT+ Designer is a Volvo Group-developed application
focused on operational development for vehicle production. Since its launch, 15 years ago …

Visualisering av kommunikations-övervakning

R Larsson, E Jons - 2024 - diva-portal.org
Denna rapport undersöker och utvecklar ett visualiseringsverktyg för övervakning av
kommunikationslarm vid Försäkringskassan. Syftet är att förbättra effektiviteten i …

Development of Virtual Image Cultural Creativity based on Multilingual Human-computer Interaction

B Wang - 2021 International Conference on Aviation Safety and …, 2021 - dl.acm.org
With the deepening of exploration, a new technology: amp; Automatic speech recognition.
Human computer interaction can be seen everywhere in people's life. Driven by science and …