7 WG 6 - HCI and Cognitive Modelling

نویسنده

  • Ernestina Menasalvas
چکیده

firewalls are not appropriate for ad hoc networks), IDS can help to monitor and analyze the traffic in UbiComp applications based on sensor networks. The analysis of audit data for the construction of intrusion detection models can be based on Data Mining algorithms which return frequent activity patterns. However, sensor networks pose new challenging requirements to DM methods, since the solution should be fully distributed and inexpensive in terms of communication, energy, and memory requirements. In addition, the networked nature of sensor networks allows new, automated defenses against DoS attacks. Some Interactive attacks, that is, the misuse of the UbiComp systems augmented facilities for responding to or receiving environmental signals, can be considered as a form of availability attacks specific of UbiComp applications. Indeed, when an interactive attack occurs, the UbiComp system might simply not properly react to some environmental signals because it is too busy to process other requests or because its reaction do not reach the environmental context. For instance, a wireless-equipped car whose processor is flooded of requests from a malicious node of an ad hoc network, will not be able to timely react to environmental signals that indicate a hazardous situation. Once again, it is important to develop the appropriate DM methods for the analysis of the stream of requests in order to identify possible misuse of the UbiComp systems augmented facilities. Since reaction time is a critical factor, the efficiency of the DM method should be considered a fundamental requirement when detecting interactive attacks. Real-time data mining can become a new active research area, where efforts on distributed data mining, knowledge discovery from data streams and on-line learning algorithms do synergistically meet.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An introduction to embodiment and digital technology research: interdisciplinary themes and perspectives

........................................................................................................... 2 Introduction ...................................................................................................... 2 1. Embodiment from the philosophy tradition ................................................... 4 2. Psychology, Cognitive Science & Neuroscience ..........................

متن کامل

Predictive modelling for HCI problems in novice program editors

We extend previous cognitive modelling work to four new programming systems, with results contributing to the development of a new novice programming editor. Results of a previous paper, which quantified differences in certain visual languages, and feedback we had regarding interest in the work, suggested that there may be more systems to which the technique could be applied. This short paper r...

متن کامل

Group- and Home-Based Cognitive Intervention for Patients with Mild Cognitive Impairment: A Randomized Controlled Trial.

BACKGROUND We examined the efficacy of group-based cognitive intervention (GCI) and home-based cognitive intervention (HCI) in amnestic mild cognitive impairment (aMCI) and intervention effects on serum brain-derived neurotrophic factor (BDNF). METHODS In this randomized and rater-blinded trial, 293 patients with aMCI from 18 nationwide hospitals were randomized: 96 to the GCI group, 98 to th...

متن کامل

Modelling Social Cognitive Theory to Explain Software Piracy Intention

This study found evidence for a viable social cognitive model of software piracy intention using path analysis. Compared to outcome expectations, moral disengagement emerged as the stronger significant mediator in the model exerting its influence on the relationships between past behaviour and future intention and between past behaviour and outcome expectations. This study found weak evidence f...

متن کامل

Symbiosis and synergy? scenarios, task analysis and reuse of HCI knowledge

This paper follows the scenarios and task models debate by reviewing the contributions of task modelling and scenario based approaches from a cognitive perspective. A framework of cognitive affordances is introduced to discuss the merits and limitations of each approach. An extension of the modelling theme, generic task models, is proposed to augment the contribution of knowledge reuse to the d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007