Sciweavers

2564 search results - page 29 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
AINA
2008
IEEE
15 years 6 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
CHI
2008
ACM
16 years 4 days ago
Eye movements as implicit relevance feedback
Reading detection is an important step in the process of automatic relevance feedback generation based on eye movements for information retrieval tasks. We describe a reading dete...
Georg Buscher, Andreas Dengel, Ludger van Elst
CRITIS
2007
15 years 1 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 12 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 5 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar