Sciweavers

2564 search results - page 35 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
RAID
1999
Springer
15 years 4 months ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...
CORR
2008
Springer
188views Education» more  CORR 2008»
14 years 10 months ago
Citation Counting, Citation Ranking, and h-Index of Human-Computer Interaction Researchers: A Comparison between Scopus and Web
: This study examines the differences between Scopus and Web of Science in the citation counting, citation ranking, and h-index of 22 top human-computer interaction (HCI) researche...
Lokman I. Meho, Yvonne Rogers
PERCOM
2005
ACM
15 years 11 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
WIAMIS
2009
IEEE
15 years 6 months ago
Adaptive gesture recognition in Human Computer Interaction
An adaptive, invariant to user performance fluctuation or noisy input signal, gesture recognition scheme is presented based on Self Organizing Maps, Markov Models and Levenshtein...
George Caridakis, Kostas Karpouzis, Athanasios I. ...
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 12 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin