Sciweavers

2564 search results - page 61 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
RAID
2010
Springer
14 years 10 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
AINA
2010
IEEE
15 years 4 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
RAID
1999
Springer
15 years 4 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
CHI
2007
ACM
16 years 6 days ago
Dynamic detection of novice vs. skilled use without a task model
If applications were able to detect a user's expertise, then software could automatically adapt to better match expertise. Detecting expertise is difficult because a user...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
AIIA
2007
Springer
15 years 6 months ago
Robust Color-Based Skin Detection for an Interactive Robot
Detection of human skin in an arbitrary image is generally hard. Most color-based skin detection algorithms are based on a static color model of the skin. However, a static model c...
Alvise Lastra, Alberto Pretto, Stefano Tonello, Em...