The aim of this work is to create an application that allows modeling of user behavior and subsequent search for anomalies in this behavior. An application entry is a list of actions the user has executed on his workstation. From this information and from information about the events that occurred on this device the behavioral model for a specific time is created. Subsequently, this model is compared to models in different time periods or with other users' models. From this comparison, we can get additional information about user behavior and also detect anomalous behavior. The information about the anomalies is useful to build security software that prevents valuable data from being stolen (from the corporate enviroment)
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
\u3cp\u3eNowadays, security is a key concern for organizations. An increasingly popular solution to ...
We describe research into the identification of anomalous events and event patterns as manifested in...
Anomaly detection is the problem of identifying data points or patterns that do not conform to norma...
Anomaly detection is the problem of identifying data points or patterns that do not conform to norma...
Over the past centuries, cybercrime has constantly grown. Among the most popular attacks against com...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...
Systems, methods and articles for determining anomalous user activity are disclosed. Data representi...
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining...
Nowadays, security is a key concern for organizations. An increasingly popular solution to enhance s...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
The increasing availability of sensors and intelligent objects enables new functionalities and serv...
<p>As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based ser...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
\u3cp\u3eNowadays, security is a key concern for organizations. An increasingly popular solution to ...
We describe research into the identification of anomalous events and event patterns as manifested in...
Anomaly detection is the problem of identifying data points or patterns that do not conform to norma...
Anomaly detection is the problem of identifying data points or patterns that do not conform to norma...
Over the past centuries, cybercrime has constantly grown. Among the most popular attacks against com...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...
Systems, methods and articles for determining anomalous user activity are disclosed. Data representi...
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining...
Nowadays, security is a key concern for organizations. An increasingly popular solution to enhance s...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
The increasing availability of sensors and intelligent objects enables new functionalities and serv...
<p>As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based ser...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
\u3cp\u3eNowadays, security is a key concern for organizations. An increasingly popular solution to ...