Sciweavers

2564 search results - page 167 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 10 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
HUC
2009
Springer
15 years 7 months ago
Sonar-based measurement of user presence and attention
We describe a technique to detect the presence of computer users. This technique relies on sonar using hardware that already exists on commodity laptop computers and other electro...
Stephen P. Tarzia, Robert P. Dick, Peter A. Dinda,...
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
MHCI
2009
Springer
15 years 9 months ago
Poker surface: combining a multi-touch table and mobile phones in interactive card games
In this paper, we introduce the design and implementation of a digital card game that combines mobile phone gestures and multitouch tabletop interactions. Conceptually based on in...
Alireza Sahami Shirazi, Tanja Döring, Pouyan ...
CHI
2007
ACM
16 years 3 months ago
Comparing two methods for gesture based short text input using chording
We report on the design and initial evaluation of two methods for short text input in wearable computing applications using hand gestures. A wireless data glove able to recognize ...
Hendrik Witt, Torben Janssen