Date of Original Version

10-2010

Type

Conference Proceeding

Journal Title

Proceedings of the Conference on Systems, Man, and Cybernetics (SMC)

First Page

3428

Last Page

3432

Rights Management

© 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Abstract or Description

While many cybersecurity tools are available to computer users, their default configurations often do not match needs of specific users. Since most modern users are not computer experts, they are often unable to customize these tools, thus getting either insufficient or excessive security. To address this problem, we are developing an automated assistant that learns security needs of the user and helps customize available tools

DOI

10.1109/ICSMC.2010.5642461

Share

COinS
 

Published In

Proceedings of the Conference on Systems, Man, and Cybernetics (SMC), 3428-3432.