NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics