Since the 1950's character recognition has been an active field of research for computer scientists worldwide. The main reason is that character recognition is not only an interesting area of theoretical research with relevance to many pattern recognition sub-fields, but also a very needed and useful real life application. Making computers able to read would allow for substantial savings in terms of the costs for data entry, mail processing, form processing and many other similar situations. Every realistic character recognition system requires a feature extraction step in order to properly...
Since the 1950's character recognition has been an active field of research for computer scientists worldwide. The main reason is that character recog...
This book is a review of published research in computer security, user authentication, intrusion detection, game security and behavioral biometrics. We analyze previous studies and point out trends and propose taxonomies which make understanding and improvement on previous work easier. In particular the majority of contributions in this book is to the field of behavioral biometrics. Research in biometric technologies offers one of the most promising approaches to providing user friendly and reliable control methodology for access to computer systems, networks and workplaces. Majority of such...
This book is a review of published research in computer security, user authentication, intrusion detection, game security and behavioral biometrics. W...
Welcome to the obsession known as Sudoku. This book will provide you with hours of fun as it contains 576 never before published computer generated Sudoku puzzles. Puzzles range in difficulty from easy to medium, hard and very hard. You get a nice equal mix of all types grouped by difficulty or if you are feeling adventurous randomized for your pleasure. Each puzzle comes with a difficulty rating (on a 100 point scale) established by a sophisticated computer algorithm and a complete solution just in case you get stuck.
Welcome to the obsession known as Sudoku. This book will provide you with hours of fun as it contains 576 never before published computer generated Su...
This book describes the development of an intrusion detection system for online poker, which uses player's game strategy as the behavioral profile. The system is improved by modifications to the similarity measure functions and different ways of representing behavioral signatures. The system is further enhanced by inclusion of spatial, temporal and contextual information about the environment alongside the user's behavior. Possibility of creation of artificial behavioral profiles and use of such profiles for spoofing of behavior-based security systems is investigated and promising results are...
This book describes the development of an intrusion detection system for online poker, which uses player's game strategy as the behavioral profile. Th...