메뉴 건너뛰기




Volumn , Issue , 2007, Pages 270-276

GUI usage analysis for masquerade detection

Author keywords

GUI usage; Intrusion detection; Masquerade detection; Profiling

Indexed keywords

ALARM SYSTEMS; COMPUTER SYSTEMS; GRAPHICAL USER INTERFACES; REAL TIME SYSTEMS;

EID: 48749087126     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2007.381943     Document Type: Conference Paper
Times cited : (15)

References (11)
  • 3
    • 0023294428 scopus 로고
    • An Intrusion Detection Model
    • Feb
    • Denning, D. 1987. An Intrusion Detection Model. IEEE Transactions on Software Engineering. Volume SE-13. Issue 2. Feb. 1987. Pages 222-232.
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 4
    • 33845948788 scopus 로고    scopus 로고
    • Garg, A., et al. 2006. Profiling Users in GUI Based Systems for Masquerade Detection. Proceedings of the 2006 IEEE Workshop on Information Assurance. June 21-23, 2006, West Point, NY, USA. Pages 48-56.
    • Garg, A., et al. 2006. Profiling Users in GUI Based Systems for Masquerade Detection. Proceedings of the 2006 IEEE Workshop on Information Assurance. June 21-23, 2006, West Point, NY, USA. Pages 48-56.
  • 5
    • 15944403914 scopus 로고    scopus 로고
    • Li, L., Manikopoulos, M. 2004. Windows NT One-class Masquerade Detection. Proceedings of the 2004 IEEE Workshop on Information Assurance. June 10-11, 2004, West Point, NY, USA. Pages 82-87
    • Li, L., Manikopoulos, M. 2004. Windows NT One-class Masquerade Detection. Proceedings of the 2004 IEEE Workshop on Information Assurance. June 10-11, 2004, West Point, NY, USA. Pages 82-87
  • 6
    • 0036931591 scopus 로고    scopus 로고
    • Maxion, R., Townsend, T. 2002. Masquerade Detection Using Truncated Command Lines. Proceedings of the 2002 IEEE International Conference on Dependable Systems and Networks. June 23-26, 2002. Pages 219-228.
    • Maxion, R., Townsend, T. 2002. Masquerade Detection Using Truncated Command Lines. Proceedings of the 2002 IEEE International Conference on Dependable Systems and Networks. June 23-26, 2002. Pages 219-228.
  • 7
    • 48749092545 scopus 로고    scopus 로고
    • MSDN Library. URL:, Accessed 10/23/06
    • Microsoft Corporation. 2006. Hooks. MSDN Library. URL: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ winui/winui/windowsuserinterface/windowing/hooks.asp. Accessed 10/23/06.
    • (2006) Hooks
  • 8
    • 48749113595 scopus 로고    scopus 로고
    • URL:, Accessed 10/23/06
    • Newcomer, J. 2001. Hooks and DLLs. URL: http://www.flounder.com/ hooks.htm. Accessed 10/23/06.
    • (2001) Hooks and DLLs
    • Newcomer, J.1
  • 9
    • 20444496997 scopus 로고    scopus 로고
    • Pusara, M., and Brodley, C. 2004. User Re-authentication via Mouse Movements. Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. October 29, 2004, Washington D.C., USA.
    • Pusara, M., and Brodley, C. 2004. User Re-authentication via Mouse Movements. Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. October 29, 2004, Washington D.C., USA.
  • 10
    • 0012282403 scopus 로고    scopus 로고
    • Computer Intrusion: Detecting Masquerades
    • February
    • Schonlau, M., et al. 2001. Computer Intrusion: Detecting Masquerades. Statistical Science, 16(1): 58-74. February 2001.
    • (2001) Statistical Science , vol.16 , Issue.1 , pp. 58-74
    • Schonlau, M.1
  • 11
    • 0022129862 scopus 로고
    • Identity Verification Through Keyboard Characteristics
    • Umphress, D., Williams, G. 1985. Identity Verification Through Keyboard Characteristics. International Journal of Man-Machine Studies, Volume 23, Issue 3, Pages 263-273.
    • (1985) International Journal of Man-Machine Studies , vol.23 , Issue.3 , pp. 263-273
    • Umphress, D.1    Williams, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.