نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

Journal: :CoRR 2017
Amir Javed Pete Burnap Omer F. Rana

The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack usin...

2013
Ryan Farley Xinyuan Wang

As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats. We show that crafted SIP traffic (noisy attack) can disable...

2010
Esther van den Bos Fenna H. Poletiek

In the contextual cueing paradigm, Endo and Takeda (in Percept Psychophys 66:293-302, 2004) provided evidence that implicit learning involves selection of the aspect of a structure that is most useful to one's task. The present study attempted to replicate this finding in artificial grammar learning to investigate whether or not implicit learning commonly involves such a selection. Participants...

2002
Keith Mitchell

..........................................................................................................................i Declaration .................................................................................................................. iii Acknowledgements....................................................................................................... iv

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

2010
Shakib Manouchehri Matthias Söllner Jan Marco Leimeister

Journal: :J. UCS 2011
Benedikt Schmidt Todor Stoitsev Max Mühlhäuser

Intention-aware systems integrate aspects of context-aware and attentionaware systems for the identification and support of intention. Focusing intention is justified by the impact of intention on awareness and interaction with the world. Therefore, proactive user support mechanisms can be improved by including a representation of intention. In this paper, the externalization of intention in ta...

2010
Benedikt Schmidt Todor Stoitsev Max Mühlhäuser

Intention-Aware systems are introduced as a system class which enables user support based on intention detection. Thereby, intention-aware systems build on the user-centric support approach of attention-aware systems and the environmentcentric support approach of context-aware systems. A framework for intention-aware systems is proposed, highlighting the importance of a task model. We review 16...

2005
Kurt Partridge James Begole Victoria Bellotti

As context-aware systems have grown in sophistication, they have adopted more complex contextual models. This paper steps back from the details of model contents and composition and investigates how personal and group models can be evaluated. A specific method is proposed that leverages the transition in the user’s cognitive state between “ready-at-hand” and “present-at-hand.”

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید