" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …
knowledge about previously observed user behavior to prevent malicious login attempts …
The role of professional product reviewers in evaluating security and privacy
W Guo, J Walter, ML Mazurek - 32nd USENIX Security Symposium …, 2023 - usenix.org
Consumers who use Internet-connected products are often exposed to security and privacy
vulnerabilities that they lack time or expertise to evaluate themselves. Can professional …
vulnerabilities that they lack time or expertise to evaluate themselves. Can professional …
The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …
Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature
X Hou, N Omar, J Wang - Frontiers in Psychology, 2022 - frontiersin.org
The advent of the intelligence age has injected new elements into the development of
literature. The synergic modification of Anglo-American (AAL) traumatic narrative (TN) …
literature. The synergic modification of Anglo-American (AAL) traumatic narrative (TN) …
On the evaluation of usability design guidelines for improving network monitoring tools interfaces
SAM Silveira, LAM Zaina, LN Sampaio… - Journal of Systems and …, 2022 - Elsevier
Network monitoring tools are vital to network administrators, helping them make decisions
and accomplish their tasks. In general, those tools are developed with a focus on technical …
and accomplish their tasks. In general, those tools are developed with a focus on technical …
[PDF][PDF] “As soon as it'sa risk, I want to require MFA”: How Administrators Configure Risk-based Authentication (Extended Version)
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …
knowledge about previously observed user behavior to prevent malicious login attempts …
[PDF][PDF] Network operator intent: a basis for user-friendly network configuration and analysis
A Curtis-Black - 2021 - ir.canterbury.ac.nz
Two important network management activities are configuration (making the network behave
in a desirable way) and analysis (querying the network's state). A challenge common to …
in a desirable way) and analysis (querying the network's state). A challenge common to …
End User Study of an Engineering Design Tool
I Johnson, AS Eriksson - 2023 - gupea.ub.gu.se
[Context and Motivation] PROSIT+ Designer is a Volvo Group-developed application
focused on operational development for vehicle production. Since its launch, 15 years ago …
focused on operational development for vehicle production. Since its launch, 15 years ago …
Visualisering av kommunikations-övervakning
R Larsson, E Jons - 2024 - diva-portal.org
Denna rapport undersöker och utvecklar ett visualiseringsverktyg för övervakning av
kommunikationslarm vid Försäkringskassan. Syftet är att förbättra effektiviteten i …
kommunikationslarm vid Försäkringskassan. Syftet är att förbättra effektiviteten i …
Development of Virtual Image Cultural Creativity based on Multilingual Human-computer Interaction
B Wang - 2021 International Conference on Aviation Safety and …, 2021 - dl.acm.org
With the deepening of exploration, a new technology: amp; Automatic speech recognition.
Human computer interaction can be seen everywhere in people's life. Driven by science and …
Human computer interaction can be seen everywhere in people's life. Driven by science and …