Establishing usability heuristics for heuristics evaluation in a specific domain: Is there a consensus?

S Hermawati, G Lawson - Applied ergonomics, 2016 - Elsevier
Heuristics evaluation is frequently employed to evaluate usability. While general heuristics
are suitable to evaluate most user interfaces, there is still a need to establish heuristics for …

Intrusion detection in networks using cuckoo search optimization

M Imran, S Khan, H Hlavacs, FA Khan, S Anwar - Soft Computing, 2022 - Springer
One of the key problems for researchers and network managers is anomaly detection in
network traffic. Anomalies in network traffic might signal a network intrusion, requiring the …

Heuristics for evaluating IT security management tools

P Jaferian, K Hawkey, A Sotirakopoulos… - Proceedings of the …, 2011 - dl.acm.org
The usability of IT security management (ITSM) tools is hard to evaluate by regular methods,
making heuristic evaluation attractive. However, standard usability heuristics are hard to …

Investigating the problem of IDS false alarms: An experimental study using Snort

GC Tjhai, M Papadaki, SM Furnell… - … of The Ifip Tc 11 23 rd …, 2008 - Springer
IDS can play a vital role in the overall security infrastructure, as one last defence against
attacks after secure network architecture design, secure program design and firewalls [1] …

Mobile application usability heuristics: decoupling context-of-use

G Joyce, M Lilley, T Barker, A Jefferies - … , DUXU 2017, Held as Part of HCI …, 2017 - Springer
Context-of-use is a vital consideration when evaluating the usability of mobile applications.
Thus, when defining sets of heuristics for the usability evaluation of mobile applications, a …

ICAS: An inter-VM IDS log cloud analysis system

SF Yang, WY Chen, YT Wang - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Cloud computing can reduce mainframe management costs, so more and more users
choose to build their own cloud hosting environment. In cloud computing, all the commands …

Heuristics for the evaluation of captchas on smartphones

G Reynaga, S Chiasson, PC van Oorschot - Proceedings of the 2015 …, 2015 - dl.acm.org
Captchas are used as a security mechanism on the web to distinguish human users from
automated programs. However, existing captchas are not well-adapted to mobile devices …

Smartphone application usability evaluation: The applicability of traditional heuristics

G Joyce, M Lilley, T Barker, A Jefferies - … , DUXU 2015, Held as Part of HCI …, 2015 - Springer
Abstract The Heuristic Evaluation method has been popular with HCI experts for over 20
years. Yet, we believe that the set of heuristics defined by Nielsen in 1994 needs to be …

Usability evaluation using specialized heuristics with qualitative indicators for intrusion detection system

T Patil, G Bhutkar, N Tarapore - … of the Second International Conference on …, 2012 - Springer
Network security promises protection of valuable and accessible network resources from
viruses, trojans, keyloggers, hijackers and unauthorized access. One of the important …

[PDF][PDF] Building ids log analysis system on novel grid computing architecture

WY Chen, WC Kuo, YT Wang - National Center for High-Performance …, 2009 - trac.3du.me
With the increasing of viruses and malicious attacks, the volume of alerts generated by
Intrusion Detection System (IDS) becomes very large. Using conventional methods to …