In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...