Sciweavers

2269 search results - page 170 / 454
» Behavioral Intrusion Detection
Sort
View
143
Voted
ICPR
2008
IEEE
15 years 11 months ago
Intuitive event modeling for personalized behavior monitoring
Behavior understanding and semantic interpretation of dynamic visual scenes have attracted a lot of attention in computer vision research community. Although the use of surveillan...
Ahmed Azough, Alexandre Delteil, Fabien De Marchi,...
138
Voted
ESORICS
2006
Springer
15 years 8 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
184
Voted

Publication
237views
14 years 6 months ago
Estimation of behavioral user state based on eye gaze and head pose—application in an e-learning environment
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...
Stylianos Asteriadis, Paraskevi Tzouveli, Kostas K...
175
Voted
AAAI
2012
13 years 7 months ago
Learning Behavior Models for Hybrid Timed Systems
A tailored model of a system is the prerequisite for various analysis tasks, such as anomaly detection, fault identification, or quality assurance. This paper deals with the algo...
Oliver Niggemann, Benno Stein, Asmir Vodencarevic,...
HICSS
2009
IEEE
125views Biometrics» more  HICSS 2009»
15 years 11 months ago
Conceptualizing Interpersonal Interruption Management: A Theoretical Framework and Research Program
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individual’s local context can be utilized to redu...
Sukeshini A. Grandhi, Quentin Jones