Sciweavers

2564 search results - page 33 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ICNP
1998
IEEE
15 years 4 months ago
Statistical Anomaly Detection for Link-State Routing Protocols
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the imple...
D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyht...
CCGRID
2006
IEEE
15 years 5 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
HCI
2009
14 years 9 months ago
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology
This paper presents a new kind of interaction between users and a tabletop. The table described is interactive and associated with tangible and traceable objects using RFID technol...
Sébastien Kubicki, Sophie Lepreux, Yoann Le...
ISWC
2000
IEEE
15 years 4 months ago
Enabling Implicit Human Computer Interaction: A Wearable RFID-Tag Reader
Implicit human computer interaction is based on the concept of using user activity in the real world as input to computers. Implicit HCI can help to reduce the problem of user inp...
Albrecht Schmidt, Hans-Werner Gellersen, Christian...
PUC
2000
107views more  PUC 2000»
14 years 11 months ago
Implicit Human Computer Interaction Through Context
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Albrecht Schmidt