The paper concerns behavioral biometrics, specifically issues related to the verification of the identity of computer systems users based on user profiling. The profiling method for creating a behavioral profile based on multiple aspects of user activity in a computer system is presented. The work is devoted to the analysis of user activity in environments with a graphical user interface GUI. Mouse activity, keyboard and software usage are taken into consideration. Additionally, an attempt to intrusion detection based on the proposed profiling method and statistical measures is performed. Preliminary studies show that the proposed profiling method could be useful in detecting an intruder masquerading as an authorized user of the computer sy...
International audienceNowadays, users interact with computer systems. Behavioral biometrics consists...
Profiling and identifying individual users is an approach for intrusion detection in a computer syst...
Most digital crimes involve finding evidence on the computer and then linking it to a suspect using ...
The article is related to the computer systems security and to the problem of detecting the masquera...
In this paper we introduce the idea of using behavioral biometrics in intrusion detection applicatio...
The article presents the new approach to a computer users verification. The research concerns an ana...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
Verifying the identity of a user logged into a secure system is an important task in the field of in...
Abstract—In this paper we survey the state of the art in direct and indirect human computer interact...
The present work proposes a new technique for the identification or prevention of intrusion in web a...
The research presented addresses the problem of insider threat mitigation and detection in computer ...
In this thesis we describe a relatively new behavioral biometrics technique based on mouse interac...
Abstract. Human behaviour has been used in biometrics. In this paper we de-scribe a new behavioural ...
AbstractThe purpose of this paper is to validate a method of collecting and analyzing behavioral bio...
The purpose of this study is to investigate the possibility of user identification based on mouse mo...
International audienceNowadays, users interact with computer systems. Behavioral biometrics consists...
Profiling and identifying individual users is an approach for intrusion detection in a computer syst...
Most digital crimes involve finding evidence on the computer and then linking it to a suspect using ...
The article is related to the computer systems security and to the problem of detecting the masquera...
In this paper we introduce the idea of using behavioral biometrics in intrusion detection applicatio...
The article presents the new approach to a computer users verification. The research concerns an ana...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
Verifying the identity of a user logged into a secure system is an important task in the field of in...
Abstract—In this paper we survey the state of the art in direct and indirect human computer interact...
The present work proposes a new technique for the identification or prevention of intrusion in web a...
The research presented addresses the problem of insider threat mitigation and detection in computer ...
In this thesis we describe a relatively new behavioral biometrics technique based on mouse interac...
Abstract. Human behaviour has been used in biometrics. In this paper we de-scribe a new behavioural ...
AbstractThe purpose of this paper is to validate a method of collecting and analyzing behavioral bio...
The purpose of this study is to investigate the possibility of user identification based on mouse mo...
International audienceNowadays, users interact with computer systems. Behavioral biometrics consists...
Profiling and identifying individual users is an approach for intrusion detection in a computer syst...
Most digital crimes involve finding evidence on the computer and then linking it to a suspect using ...