Sciweavers

2564 search results - page 203 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
124
Voted
CHI
2004
ACM
16 years 3 months ago
Model-based evaluation of cell phone menu interaction
Cell phone interfaces are now ubiquitous. In this paper, we describe concepts to support the analysis of cell phone menu hierarchies. We present an empirical study of user perform...
Robert St. Amant, Thomas E. Horton, Frank E. Ritte...
MCS
2010
Springer
15 years 5 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli
IWCMC
2010
ACM
15 years 8 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
JUCS
2008
112views more  JUCS 2008»
15 years 3 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
135
Voted
ACSAC
2010
IEEE
15 years 23 days ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...