Most digital crimes involve finding evidence on the computer and then linking it to a suspect using login information, such as a username and a password. However, login information is often shared or compromised. In such a situation, there needs to be a way to identify the user without relying exclusively on login credentials. This paper introduces the concept that users may show behavioral traits which might provide more information about the user on the computer. This hypothesis was tested by conducting an experiment in which subjects were required to perform common tasks on a computer, over multiple sessions. The choices they made to complete each task was recorded. These were converted to a \u27behavior profile,\u27 corresponding to eac...
User attribution, the process of identifying a human in a digital medium, is a research area that ha...
This work addresses the challenge of discerning non-exact or non-obvious similarities between cyber-...
Authentication plays an important role in how we interact with computers, mobile devices, the web, ...
Most digital crimes involve finding evidence on the computer and then linking this evidence to a sus...
Intrusion detection systems (IDS) have often been used to analyse network traffic to help network ad...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
The increase in the use of digital devices, has vastly increased the amount of data used and consequ...
AbstractThis paper proposes a new approach to the forensic investigation of Internet history artefac...
Profiling and identifying individual users is an approach for intrusion detection in a computer syst...
Part 1: Internet Crime InvestigationsInternational audienceDetermining the source of criminal activi...
The growing popularity of cyberlocker service has led to significant impact on the Internet that it ...
This paper proposes a new approach to the forensic investigation of Internet history artefacts by ag...
User attribution, the process of identifying a human in a digital medium, is a research area that ha...
The paper concerns behavioral biometrics, specifically issues related to the verification of the ide...
Presently, computer crime is rampant and costly. Combating these crimes is not only focused on the t...
User attribution, the process of identifying a human in a digital medium, is a research area that ha...
This work addresses the challenge of discerning non-exact or non-obvious similarities between cyber-...
Authentication plays an important role in how we interact with computers, mobile devices, the web, ...
Most digital crimes involve finding evidence on the computer and then linking this evidence to a sus...
Intrusion detection systems (IDS) have often been used to analyse network traffic to help network ad...
"Article accepted for publication in Communications of SIWN © 2008 The Foresight Academy of Technolo...
The increase in the use of digital devices, has vastly increased the amount of data used and consequ...
AbstractThis paper proposes a new approach to the forensic investigation of Internet history artefac...
Profiling and identifying individual users is an approach for intrusion detection in a computer syst...
Part 1: Internet Crime InvestigationsInternational audienceDetermining the source of criminal activi...
The growing popularity of cyberlocker service has led to significant impact on the Internet that it ...
This paper proposes a new approach to the forensic investigation of Internet history artefacts by ag...
User attribution, the process of identifying a human in a digital medium, is a research area that ha...
The paper concerns behavioral biometrics, specifically issues related to the verification of the ide...
Presently, computer crime is rampant and costly. Combating these crimes is not only focused on the t...
User attribution, the process of identifying a human in a digital medium, is a research area that ha...
This work addresses the challenge of discerning non-exact or non-obvious similarities between cyber-...
Authentication plays an important role in how we interact with computers, mobile devices, the web, ...