Sciweavers

175 search results - page 9 / 35
» Using reinforcement to strengthen users' secure behaviors
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
CSCW
2006
ACM
14 years 1 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson
SACMAT
2010
ACM
13 years 6 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
CHI
2009
ACM
14 years 8 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...