Detecting abnormal user behavior through pattern-mining input device analytics
Abstract
References
Index Terms
- Detecting abnormal user behavior through pattern-mining input device analytics
Recommendations
Game Analytics for Game User Research, Part 1: A Workshop Review and Case Study
The emerging field of game user research (GUR) investigates interaction between players and games and the surrounding context of play. Game user researchers have explored methods from, for example, human-computer interaction, psychology, interaction ...
A Camera-Based Input Device for Large Interactive Displays
Humanýcomputer interaction using large-format displays is an active area of research that focuses on how humans can better work with computers or other machines. For this to happen, there must be an enabling technology that creates the interface between ...
Multi-touch surface as input device
ITS '10: ACM International Conference on Interactive Tabletops and SurfacesIn consideration of the rapid development of displays and multi-touch technologies, many workspaces could feature integrated multi-touch displays in the near future and therefore the possibility of using them as input devices for other computers needs ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- US Army Research Office: US Army Research Office
- NSF: National Science Foundation
- University of Illinois at Urbana-Champaign
- National Security Agency: National Security Agency
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Funding Sources
- National Security Agency
Conference
- US Army Research Office
- NSF
- National Security Agency
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 214Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in