Sciweavers

2564 search results - page 43 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
EUROSYS
2009
ACM
15 years 9 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
CHI
2009
ACM
15 years 6 months ago
Tracking behavior in persuasive apps: is sensor-based detection always better than user self-reporting?
This paper aims to discuss the roles for the two types of tracking user behavior. Considering these two types of tracking, sensor based recognition has a great advantage when sens...
Miyuki Shiraishi, Yasuyuki Washio, Chihiro Takayam...
CCS
2010
ACM
15 years 1 hour ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
NOSSDAV
2010
Springer
15 years 4 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker
MM
2004
ACM
107views Multimedia» more  MM 2004»
15 years 5 months ago
15 seconds of fame: an interactive, computer-vision based art installation
“15 seconds of fame1 ” is an interactive art installation which elevates the face of a randomly selected gallery visitor for 15 seconds into a “work of art”. The installat...
Borut Batagelj, Franc Solina, Peter Peer