Sciweavers

2564 search results - page 21 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
88
Voted
ICARIS
2007
Springer
15 years 5 months ago
Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....
RAID
2004
Springer
15 years 5 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
HCI
2009
14 years 9 months ago
Partially Observable Markov Decision Process (POMDP) Technologies for Sign Language Based Human-Computer Interaction
Sign language (SL) recognition modules in human-computer interaction systems need to be both fast and reliable. In cases where multiple sets of features are extracted from the SL d...
Sylvie C. W. Ong, David Hsu, Wee Sun Lee, Hanna Ku...
EUROSSC
2007
Springer
15 years 6 months ago
The Design of a Pressure Sensing Floor for Movement-Based Human Computer Interaction
This paper addresses the design of a large area, high resolution, networked pressure sensing floor with primary application in movement-based human-computer interaction (M-HCI). T...
Sankar Rangarajan, Assegid Kidané, Gang Qia...
APNOMS
2006
Springer
15 years 3 months ago
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clust...
Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim