With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
: This paper describes an approach to integrate UCD activities into the existing Software Engineering practices and processes. The aim is to use the outcomes of UCD activities thro...
This work-in-progress report presents the groundwork for the design of a user-adaptive web-based e-learning system. A survey and two randomized controlled experiments were carried...
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities. MyExperience combines the following two techniq...
Jon Froehlich, Mike Y. Chen, Sunny Consolvo, Bever...