The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the documented need to train and educate more cybersecurity professionals, we have little rigorous evidence to inform educators on effective ways to engage, educate, or retain cybersecurity students. To begin addressing this gap in our knowledge, we are conducting a series of think-aloud interviews with cybersecurity students to study how students reason about core cybersecurity concepts....
In recent years, computer and network attacks have increased tremendously. They turned out to be more sophisticated, complex and evolving in an unpredictable manner. This work presents a novel attack classification. It offers a generic attack description to classify, help identify and defend against computer and network attacks. Our approach takes into account several attack properties in order to...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
In this paper, a creature-based futuristic sociable dining table is proposed that communicates through a knock on a table. The main objective was to create a minimal number of cues for protocol communication for the purpose of establishing social interactions between a creature and a human. The creature uses a knock (within a specific period) with a Temporal Difference (TD) learning model to learn...
This paper describes the design and implementation of a ubiquitous learning system called prête-à-apprendre+. The system is based on e-textile components and consists of shirts and fabric pads that communicate through the Zigbee wireless protocol. A simple tag game based on this ubiquitous platform is described.
Shim6 is a host-centric multihoming solution for IPv6 networks which has been chosen by the IETF as a multihoming solution for the future Internet. Shim6 employs REAchability Protocol (REAP) for failure detection and recovery. REAP enables multi-addressed hosts which are involved in a communication to detect and recover path failures without breaking the transport layer sessions. One concern about...
If cluster C1 consists of computers with a faster mean speed than the computers in cluster C2, does this imply that cluster C1 is more productive than cluster C2? What if the computers in cluster C1 have the same mean speed as the computers in cluster C2: is the one with computers that have a higher variance in speed more productive? Simulation experiments are performed to explore the above questions...
The problem of accessing and managing digital contents scattered on personal portable devices such as smart phone, digital camera, MP3 player, or laptop in an integrated fashion is critical in ubiquitous computing. It is not trivially solvable because the underlying networks are dynamically configured and the data types supported by each device are constrained. Due to recent rapid growth in personal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.