Sciweavers

2564 search results - page 27 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 5 months ago
Automatic detection of interaction groups
This paper addresses the problem of detecting interaction groups in an intelligent environment. To understand human activity, we need to identify human actors and their interperso...
Oliver Brdiczka, Jérôme Maisonnasse, ...
ISNN
2005
Springer
15 years 5 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
ICMLA
2009
15 years 8 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 5 days ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
EUROMICRO
2004
IEEE
15 years 3 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour