"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technology" http://fatech.org.uk/press/siwn/The security of a computer is based on the realization of confidentiality, integrity, and availability. A computer can keep track of computer users to improve the security in the system. However, this does not prevent a user from impersonating another user. If a computer system can model the behavior of the users, it can be very beneficial detecting masqueraders, assisting them or predicting their future actions. In this paper, we present three different methods for classifying the behavior of a computer user. The proposed three methods are: Bayesian Netwoks, Hidden Markov Models and a method based on Term ...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
A computer can keep track of computer users to improve the security in the system. However, this doe...
A computer can keep track of computer users to improve the security in the system. However, this doe...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
Knowledge about computer users is very beneficial for assisting them, predicting their future action...
A computer can keep track of computer users to improve the security in the system. However, this doe...
A computer can keep track of computer users to improve the security in the system. However, this doe...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Abstract. This paper focuses on the study of a new method for de-tecting masqueraders in computer sy...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
A computer can keep track of computer users to improve the security in the system. However, this doe...
A computer can keep track of computer users to improve the security in the system. However, this doe...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
Knowledge about computer users is very beneficial for assisting them, predicting their future action...
A computer can keep track of computer users to improve the security in the system. However, this doe...
A computer can keep track of computer users to improve the security in the system. However, this doe...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Abstract. This paper focuses on the study of a new method for de-tecting masqueraders in computer sy...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
Proceeding of: 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) in the 2010 IEEE Worl...
A computer can keep track of computer users to improve the security in the system. However, this doe...
A computer can keep track of computer users to improve the security in the system. However, this doe...