نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack usin...
As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats. We show that crafted SIP traffic (noisy attack) can disable...
In the contextual cueing paradigm, Endo and Takeda (in Percept Psychophys 66:293-302, 2004) provided evidence that implicit learning involves selection of the aspect of a structure that is most useful to one's task. The present study attempted to replicate this finding in artificial grammar learning to investigate whether or not implicit learning commonly involves such a selection. Participants...
..........................................................................................................................i Declaration .................................................................................................................. iii Acknowledgements....................................................................................................... iv
certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...
Intention-aware systems integrate aspects of context-aware and attentionaware systems for the identification and support of intention. Focusing intention is justified by the impact of intention on awareness and interaction with the world. Therefore, proactive user support mechanisms can be improved by including a representation of intention. In this paper, the externalization of intention in ta...
Intention-Aware systems are introduced as a system class which enables user support based on intention detection. Thereby, intention-aware systems build on the user-centric support approach of attention-aware systems and the environmentcentric support approach of context-aware systems. A framework for intention-aware systems is proposed, highlighting the importance of a task model. We review 16...
As context-aware systems have grown in sophistication, they have adopted more complex contextual models. This paper steps back from the details of model contents and composition and investigates how personal and group models can be evaluated. A specific method is proposed that leverages the transition in the user’s cognitive state between “ready-at-hand” and “present-at-hand.”
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید