The article presents the new approach to a computer users verification. The research concerns an analysis of user’s continuous activity related to a keyboard used while working with various software. This type of analysis constitutes a type of free-text analysis. The presented method is based on the analysis of users activity while working with particular computer software (e.g. text editors, utilities). A method of computer user profiling is proposed and an attempt to intrusion detection based on k-NN classifier is performed. The obtained results show that the introduced method can be used in the intrusion detection and monitoring systems. Such systems are especially needed in medical facilities where sensitive data are processed
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
Digital fingerprinting is an important but still challenging aspect of network forensics. This paper...
A literature review was done to find that there are still issues with writing passwords. From the in...
The paper concerns behavioral biometrics, specifically issues related to the verification of the ide...
Keystroke dynamics can be useful to ascertain personal identity even after an authentication phase h...
The article is related to the computer systems security and to the problem of detecting the masquera...
As a part of the semester work, the program Keylog is made as a model for the characteristic feature...
The increasing number of personal data leaks becomes one of the most important security issues hence...
Most computer systems provide an authentication mechanism based on a user identification number and ...
The present work proposes a new technique for the identification or prevention of intrusion in web a...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
The research presented addresses the problem of insider threat mitigation and detection in computer ...
This work is devoted to the analysis of the algorithmic support of the keyboard handwriting recognit...
One important issue faced by companies is to secure their information and resources from intrusions....
For long-text-input of about 650 strokes, a keystroke biometric system was developed for application...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
Digital fingerprinting is an important but still challenging aspect of network forensics. This paper...
A literature review was done to find that there are still issues with writing passwords. From the in...
The paper concerns behavioral biometrics, specifically issues related to the verification of the ide...
Keystroke dynamics can be useful to ascertain personal identity even after an authentication phase h...
The article is related to the computer systems security and to the problem of detecting the masquera...
As a part of the semester work, the program Keylog is made as a model for the characteristic feature...
The increasing number of personal data leaks becomes one of the most important security issues hence...
Most computer systems provide an authentication mechanism based on a user identification number and ...
The present work proposes a new technique for the identification or prevention of intrusion in web a...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
The research presented addresses the problem of insider threat mitigation and detection in computer ...
This work is devoted to the analysis of the algorithmic support of the keyboard handwriting recognit...
One important issue faced by companies is to secure their information and resources from intrusions....
For long-text-input of about 650 strokes, a keystroke biometric system was developed for application...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
Digital fingerprinting is an important but still challenging aspect of network forensics. This paper...
A literature review was done to find that there are still issues with writing passwords. From the in...