Sciweavers

175 search results - page 11 / 35
» Using reinforcement to strengthen users' secure behaviors
Sort
View
BC
2008
134views more  BC 2008»
13 years 8 months ago
Interacting with an artificial partner: modeling the role of emotional aspects
In this paper we introduce a simple model based on probabilistic finite state automata to describe an emotional interaction between a robot and a human user, or between simulated a...
Isabella Cattinelli, Massimiliano Goldwurm, N. Alb...
AGENTS
1997
Springer
14 years 3 days ago
INSIGHT: A Virtual Laboratory for Looking into Behavior-Based Autonomous Agents
This paper introduces a 3D simulation environment for experiments with behavior-based autonomous agents. The virtual laboratory INSIGHT allows the user to design and run a great v...
Simone Strippgen
CSDA
2008
147views more  CSDA 2008»
13 years 8 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
ICISS
2007
Springer
14 years 2 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
DSN
2000
IEEE
14 years 11 days ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur