메뉴 건너뛰기




Volumn 48, Issue 4, 2010, Pages 548-558

Toward user patterns for online security: Observation time and online user identification

Author keywords

Behavioral signatures; Biometrics; Electronic commerce; Online security; User identification; Web usage mining

Indexed keywords

BEHAVIORAL SIGNATURES; MULTI-FACTOR AUTHENTICATION; ON-LINE IDENTIFICATION; ON-LINE SECURITIES; ONLINE USERS; POTENTIAL APPLICATIONS; TIME PERIODS; USER DATA; USER IDENTIFICATION; WEB USAGE MINING;

EID: 75549084907     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2009.11.005     Document Type: Article
Times cited : (28)

References (36)
  • 1
    • 0035251446 scopus 로고    scopus 로고
    • Using data mining methods to build customer profiles
    • Adomavicius G., and Tuzhilin A. Using data mining methods to build customer profiles. IEEE Computer 34 2 (2001) 74-82
    • (2001) IEEE Computer , vol.34 , Issue.2 , pp. 74-82
    • Adomavicius, G.1    Tuzhilin, A.2
  • 3
    • 0031233424 scopus 로고    scopus 로고
    • Speaker recognition: a tutorial
    • Campbell Jr. J.P. Speaker recognition: a tutorial. Proceedings of the IEEE 85 9 (1997) 1437-1462
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1437-1462
    • Campbell Jr., J.P.1
  • 4
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 1 (2005) 28-46
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 10
    • 44849122540 scopus 로고    scopus 로고
    • Understanding individual human mobility patterns
    • González M.C., Hidalgo C.A., and Barabási A. Understanding individual human mobility patterns. Nature 453 (2008) 779-782
    • (2008) Nature , vol.453 , pp. 779-782
    • González, M.C.1    Hidalgo, C.A.2    Barabási, A.3
  • 11
    • 32544451794 scopus 로고    scopus 로고
    • Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
    • Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems 41 3 (2006) 592-603
    • (2006) Decision Support Systems , vol.41 , Issue.3 , pp. 592-603
    • Gupta, M.1    Rees, J.2    Chaturvedi, A.3    Chi, J.4
  • 14
    • 7744236435 scopus 로고    scopus 로고
    • Earwitnesses: effects of speech duration, retention interval and acoustic environment
    • Kerstholt J., Jansen N., Van Amelsvoort A., and Broeders A. Earwitnesses: effects of speech duration, retention interval and acoustic environment. Applied Cognitive Psychology 18 3 (2004) 327-336
    • (2004) Applied Cognitive Psychology , vol.18 , Issue.3 , pp. 327-336
    • Kerstholt, J.1    Jansen, N.2    Van Amelsvoort, A.3    Broeders, A.4
  • 15
    • 36249020892 scopus 로고    scopus 로고
    • A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents
    • Kim D.J., Ferrin D.L., and Rao H.R. A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44 2 (2008) 544-564
    • (2008) Decision Support Systems , vol.44 , Issue.2 , pp. 544-564
    • Kim, D.J.1    Ferrin, D.L.2    Rao, H.R.3
  • 16
    • 28744443618 scopus 로고    scopus 로고
    • Monitoring and reporting of fingerprint image quality and match accuracy for a large user application
    • Ko T., and Krishnan R. Monitoring and reporting of fingerprint image quality and match accuracy for a large user application. Proc. 33rd Applied Imagery Pattern Recognition Workshop (2004) 159-164
    • (2004) Proc. 33rd Applied Imagery Pattern Recognition Workshop , pp. 159-164
    • Ko, T.1    Krishnan, R.2
  • 17
    • 0001781295 scopus 로고    scopus 로고
    • Web mining research: a survey
    • Kosala R., and Blockeel H. Web mining research: a survey. SIGKDD Explorations 2 1 (2000) 1-15
    • (2000) SIGKDD Explorations , vol.2 , Issue.1 , pp. 1-15
    • Kosala, R.1    Blockeel, H.2
  • 22
    • 84936893490 scopus 로고
    • Vital signs of identity
    • Miller B. Vital signs of identity. IEEE Spectrum 31 2 (1994) 22-30
    • (1994) IEEE Spectrum , vol.31 , Issue.2 , pp. 22-30
    • Miller, B.1
  • 23
    • 0036117227 scopus 로고    scopus 로고
    • Discovery and evaluation of aggregate usage profiles for web personalization
    • Mobasher B., Dai H., Luo T., and Nakagawa M. Discovery and evaluation of aggregate usage profiles for web personalization. Data Mining and Knowledge Discovery 6 1 (2002) 61-82
    • (2002) Data Mining and Knowledge Discovery , vol.6 , Issue.1 , pp. 61-82
    • Mobasher, B.1    Dai, H.2    Luo, T.3    Nakagawa, M.4
  • 27
    • 0002000090 scopus 로고    scopus 로고
    • Web usage mining: discovery and applications of usage patterns from web data
    • Srivastava J., Cooley R., Deshpande M., and Tan P.-T. Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explorations 1 2 (2000) 12-23
    • (2000) SIGKDD Explorations , vol.1 , Issue.2 , pp. 12-23
    • Srivastava, J.1    Cooley, R.2    Deshpande, M.3    Tan, P.-T.4
  • 28
    • 0000280419 scopus 로고
    • Effective is security: an empirical study
    • Straub D. Effective is security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 30
    • 0000459353 scopus 로고    scopus 로고
    • The lack of a priori distinctions between learning algorithms
    • Wolpert D.H. The lack of a priori distinctions between learning algorithms. Neural Computation 8 7 (1996) 1341-1390
    • (1996) Neural Computation , vol.8 , Issue.7 , pp. 1341-1390
    • Wolpert, D.H.1
  • 32
    • 33847018674 scopus 로고    scopus 로고
    • GHIC: a hierarchical pattern based clustering algorithm for grouping web transactions
    • Yang Y., and Padmanabhan B. GHIC: a hierarchical pattern based clustering algorithm for grouping web transactions. IEEE Transactions on Knowledge and Data Engineering 17 9 (2005) 1300-1304
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.9 , pp. 1300-1304
    • Yang, Y.1    Padmanabhan, B.2
  • 33
    • 0040038177 scopus 로고
    • Voice identification over the telephone
    • Yarmey A.D. Voice identification over the telephone. Journal of Applied Social Psychology 21 22 (1991) 1868-1876
    • (1991) Journal of Applied Social Psychology , vol.21 , Issue.22 , pp. 1868-1876
    • Yarmey, A.D.1
  • 35
    • 53349109106 scopus 로고    scopus 로고
    • An economic mechanism for better internet security
    • Zhao X., Fang F., and Whinston A.B. An economic mechanism for better internet security. Decision Support Systems 45 4 (2008) 811-821
    • (2008) Decision Support Systems , vol.45 , Issue.4 , pp. 811-821
    • Zhao, X.1    Fang, F.2    Whinston, A.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.