5 research outputs found
Development of a single honeypot system interface
Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing
the organization’s security level.Perpetrators of cybercrime will take this advantage to exploit other systems in their network.To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network.This paper focuses on development of batch
files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks.Technically, this paper will guide user in Honeypot configuration process
"Hey Model!" -- Natural User Interactions and Agency in Accessible Interactive 3D Models
While developments in 3D printing have opened up opportunities for improved
access to graphical information for people who are blind or have low vision
(BLV), they can provide only limited detailed and contextual information.
Interactive 3D printed models (I3Ms) that provide audio labels and/or a
conversational agent interface potentially overcome this limitation. We
conducted a Wizard-of-Oz exploratory study to uncover the multi-modal
interaction techniques that BLV people would like to use when exploring I3Ms,
and investigated their attitudes towards different levels of model agency.
These findings informed the creation of an I3M prototype of the solar system. A
second user study with this model revealed a hierarchy of interaction, with BLV
users preferring tactile exploration, followed by touch gestures to trigger
audio labels, and then natural language to fill in knowledge gaps and confirm
understanding.Comment: Paper presented at ACM CHI 2020: Proceedings of the 2020 CHI
Conference on Human Factors in Computing Systems, ACM, New York, April 2020;
Replacement: typos correcte
DEVELOPMENT OF A SINGLE HONEYPOT SYSTEM INTERFACE
ABSTRACT. Networking is crucial to any organization which interconnecting systems all around the globe. However, networking is exposed to the increase of threats that have been detected which reducing the organization's security level. Perpetrators of cybercrime will take this advantage to exploit other systems in their network. To enhance the security level of networking, Honeypot technology has been created to detect the unauthorized use of network. This paper focuses on development of batch files that execute a normal computer as a Honeypot. The main goal of this system is to capture information on every network attacks. Technically, this paper will guide user in Honeypot configuration process