Sciweavers

2564 search results - page 53 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
HCI
2009
14 years 9 months ago
Front Environment Recognition of Personal Vehicle Using the Image Sensor and Acceleration Sensors for Everyday Computing
In this research, we propose the method for detecting moving objects in front of the Segway by detecting running state for the Segway. Running state of the personal vehicle Segway ...
Takahiro Matsui, Takeshi Imanaka, Yasuyuki Kono
ICDCSW
2005
IEEE
15 years 5 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICCS
2007
Springer
15 years 6 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
LREC
2010
186views Education» more  LREC 2010»
15 years 1 months ago
WITcHCRafT: A Workbench for Intelligent exploraTion of Human ComputeR conversaTions
We present Witchcraft, an open-source framework for the evaluation of prediction models for spoken dialogue systems based on interaction logs and audio recordings. The use of Witc...
Alexander Schmitt, Gregor Bertrand, Tobias Heinrot...
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 9 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski