-
1
-
-
33745449771
-
Anomaly intrusion detection based on biometrics
-
DOI 10.1109/IAW.2005.1495997, 1495997, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
Ahmed, A. A. E. & Traore, I. 2005, 'Anomaly intrusion detection based on biometrics,' in Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, pp. 452-453. (Pubitemid 43948767)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 452-453
-
-
Ahmed, A.A.E.1
Traore, I.2
-
4
-
-
0035879674
-
Intrusion detection through learning behavior model
-
DOI 10.1016/S0140-3664(00)00364-9, PII S0140366400003649
-
Balajinath, B. & Raghavan, S. V. 2001, 'Intrusion detection through learning behaviour model,' Computer Communications, vol. 24, no. 12, pp. 1202-1212. (Pubitemid 32610612)
-
(2001)
Computer Communications
, vol.24
, Issue.12
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
5
-
-
12744252161
-
Identity verification through dynamic keystroke analysis
-
Bergadano, F., Gunetti, D. & Picardi, C. 2003, 'Identity verification through dynamic keystroke analysis,' Intelligent Data Analysis, vol. 7, no. 5, pp. 469-496.
-
(2003)
Intelligent Data Analysis
, vol.7
, Issue.5
, pp. 469-496
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
6
-
-
0015992112
-
User behaviour on an interactive computer system
-
Boies, S. J. 1974, 'User Behaviour on an Interactive Computer System,' IBM Systems Journal, vol. 13, no. 1, pp. 2-18.
-
(1974)
IBM Systems Journal
, vol.13
, Issue.1
, pp. 2-18
-
-
Boies, S.J.1
-
7
-
-
0142222738
-
Detection and classification of intrusions and faults using sequences of system calls
-
Cabrera, J. B. D., Lewis, L. & Mehra, R. K. 2001, 'Detection and classification of intrusions and faults using sequences of system calls,' SIGMOD Rec., vol. 30, no. 4, pp. 25-34.
-
(2001)
SIGMOD Rec.
, vol.30
, Issue.4
, pp. 25-34
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehra, R.K.3
-
8
-
-
0032072005
-
Discovering user access patterns on the World Wide Web
-
PII S0950705198000379
-
Cheung, D. W., Kao, B. & Lee, J. 1998, 'Discovering user access patterns on the World Wide Web,' Knowledge-Based Systems, vol. 10, no. 7, pp. 463-470. (Pubitemid 128393685)
-
(1998)
Knowledge-Based Systems
, vol.10
, Issue.7
, pp. 463-470
-
-
Cheung, D.W.1
Kao, B.2
Lee, J.3
-
9
-
-
0035384440
-
What do web users do? An empirical analysis of web use
-
Cockburn, A. & McKenzie, B. 2001, 'What do web users do? An empirical analysis of web use,' International Journal of Human-Computer Studies, vol. 54, no. 6, pp. 903-922.
-
(2001)
International Journal of Human-Computer Studies
, vol.54
, Issue.6
, pp. 903-922
-
-
Cockburn, A.1
McKenzie, B.2
-
10
-
-
0023294428
-
An intrusion-detection model
-
Denning, D. E. 1987, 'An Intrusion-Detection Model,' Software Engineering, IEEE Transactions on, vol. 13, no. 2, pp. 222-232.
-
(1987)
Software Engineering, IEEE Transactions on
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
11
-
-
14944379887
-
A behavioural approach to worm detection
-
ACM, Washington DC, USA
-
Ellis, D. R., Aiken, J. G., Attwood, K. S. & Tenaglia, S. D. 2004, 'A behavioural approach to worm detection,' in Proceedings of the 2004 ACM workshop on Rapid malcode, ACM, Washington DC, USA, pp. 43-53.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 43-53
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
12
-
-
85008024136
-
James P. Anderson: An information security pioneer
-
Eugene, S. 2008, 'James P. Anderson: An Information Security Pioneer,' IEEE Security & Privacy, vol. 6, no. 1, pp. 9.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.1
, pp. 9
-
-
Eugene, S.1
-
13
-
-
0029716418
-
A sense of self for Unix processes
-
Forrest, S., Hofmeyr, S. A., Somayaji, A. & Longstaff, T. A. 1996, 'A sense of self for Unix processes,' in Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, pp. 120-128.
-
(1996)
Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
77952384694
-
Principled reasoning and practical applications of alert fusion in intrusion detection systems
-
ACM, Tokyo, Japan
-
Gu, G., Cardenas, A. A. & Lee, W. 2008, 'Principled reasoning and practical applications of alert fusion in intrusion detection systems,' in Proceedings of the 2008 ACM symposium on Information, computer and communications security, ACM, Tokyo, Japan, pp. 136-147.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security
, pp. 136-147
-
-
Gu, G.1
Cardenas, A.A.2
Lee, W.3
-
15
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S. A., Forrest, S. & Somayaji, A. 1998, 'Intrusion detection using sequences of system calls,' Journal of Computer Security, vol. 6, no. 3, pp. 151.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
16
-
-
48749087126
-
GUI usage analysis for masquerade detection
-
IEEE SMC
-
Imsand, E. S. & Hamilton, J. A. 2007, 'GUI Usage Analysis for Masquerade Detection,' in Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC, pp. 270-276.
-
(2007)
Information Assurance and Security Workshop, 2007. IAW '07
, pp. 270-276
-
-
Imsand, E.S.1
Hamilton, J.A.2
-
17
-
-
0242540448
-
Mining intrusion detection alarms for actionable knowledge
-
ACM, Edmonton, Alberta, Canada
-
Julisch, K. & Dacier, M. 2002, 'Mining intrusion detection alarms for actionable knowledge,' in Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, Edmonton, Alberta, Canada, pp. 366-375.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 366-375
-
-
Julisch, K.1
Dacier, M.2
-
19
-
-
34250174828
-
Windows NT user profiling for masquerader detection
-
1673177, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06
-
Li, L., Sui, S. & Manikopoulos, C. N. 2006, 'Windows NT User Profiling for Masquerader Detection,' in Networking, Sensing and Control, 2006. ICNSC '06. Proceedings of the 2006 IEEE International Conference on, pp. 386-391. (Pubitemid 46900518)
-
(2006)
Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06
, pp. 386-391
-
-
Li, L.1
Sui, S.2
Manikopoulos, C.N.3
-
20
-
-
84949211287
-
EXpert-BSM: A host-based intrusion detection solution for sun solaris
-
IEEE Computer Society, New Orleans, Louisiana
-
Lindqvist, U. & Porras, P. A. 2001, 'eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris,' in 17th Annual Computer Security Applications Conference, IEEE Computer Society, New Orleans, Louisiana, pp. 2-40.
-
(2001)
17th Annual Computer Security Applications Conference
, pp. 2-40
-
-
Lindqvist, U.1
Porras, P.A.2
-
21
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
Leggett, J., Williams, G., Usnick, M. & Longnecker, M. 1991, 'Dynamic identity verification via keystroke characteristics,' International Journal of Man-Machine Studies, vol. 35, no. 6, pp. 859-870.
-
(1991)
International Journal of Man-Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
22
-
-
84864573221
-
User identification via process profiling: Extended abstract
-
ACM, Oak Ridge, Tennessee
-
McKinney, S. & Reeves, D. S. 2009, 'User identification via process profiling: extended abstract,' in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, ACM, Oak Ridge, Tennessee, pp. 1-4.
-
(2009)
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
, pp. 1-4
-
-
McKinney, S.1
Reeves, D.S.2
-
23
-
-
0030675109
-
Authentication via keystroke dynamics
-
ACM, Zurich, Switzerland
-
Doi: Monrose, F. & Rubin, A. 1997, 'Authentication via keystroke dynamics,' in Proceedings of the 4th ACM conference on Computer and communications security, ACM, Zurich, Switzerland, pp. 48-56.
-
(1997)
Proceedings of the 4th ACM Conference on Computer and Communications Security
, pp. 48-56
-
-
Monrose, F.1
Rubin, A.2
-
24
-
-
77954581921
-
User modelling for exclusion and anomaly detection: A behavioural intrusion detection system
-
Springer, Berlin
-
Pannell, G. & Ashman, H. 2010, 'User Modelling for Exclusion and Anomaly Detection: A Behavioural Intrusion Detection System,' in 18th Intl. User Modeling, Adaptation, and Personalization, Springer, Berlin, pp. 207-218.
-
(2010)
18th Intl. User Modeling, Adaptation, and Personalization
, pp. 207-218
-
-
Pannell, G.1
Ashman, H.2
-
25
-
-
20444496997
-
User re-authentication via mouse movements
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
Pusara, M. & Brodley, C. E. 2004, 'User re-authentication via mouse movements,' in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ACM, Washington DC, USA, pp. 1-8. (Pubitemid 40821167)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
26
-
-
85192902604
-
A survey of user authentication based on mouse dynamics
-
Springer, London, UK
-
Revett, K., Jahankhani, H., Magalhães, S. T. & Santos, H. M. D. 2008, 'A Survey of User Authentication Based on Mouse Dynamics,' in Global E-Security, 4th International Conference, ICGeS 2008, Springer, London, UK, pp. 210-219.
-
(2008)
Global E-Security, 4th International Conference, ICGeS 2008
, pp. 210-219
-
-
Revett, K.1
Jahankhani, H.2
Magalhães, S.T.3
Santos, H.M.D.4
-
27
-
-
60349131555
-
A bioinformatics based approach to user authentication via keystroke dynamics
-
Revett, K. 2009, 'A bioinformatics based approach to user authentication via keystroke dynamics,' International Journal of Control, Automation and Systems, vol. 7, no. 1, pp. 7-15.
-
(2009)
International Journal of Control, Automation and Systems
, vol.7
, Issue.1
, pp. 7-15
-
-
Revett, K.1
-
28
-
-
12244298487
-
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
-
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Shavlik, J. & Shavlik, M. 2004, 'Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage,' in Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, Seattle, WA, USA, pp. 276-285. (Pubitemid 40114937)
-
(2004)
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 276-285
-
-
Shavlik, J.1
Shavlik, M.2
-
30
-
-
33747144912
-
Behavior-based modeling and its application to Email analysis
-
DOI 10.1145/1149121.1149125
-
Stolfo, S. J., Hershkop, S., Hu, C.-W., Li, W.-J., Nimeskern, O. & Wang, K. 2006, 'Behaviour-based modeling and its application to Email analysis,' ACM Trans. Internet Technol., vol. 6, no. 2, pp. 187-221. (Pubitemid 44222718)
-
(2006)
ACM Transactions on Internet Technology
, vol.6
, Issue.2
, pp. 187-221
-
-
Stolfo, S.J.1
Hershkop, S.2
Hu, C.-W.3
Li, W.-J.4
Nimeskern, O.5
Wang, K.E.6
-
31
-
-
0029531733
-
The application of neural networks to UNIX computer security
-
Tan, K. 1995, 'The application of neural networks to UNIX computer security,' in Neural Networks, 1995. Proceedings., IEEE International Conference on, pp. 476-481.
-
(1995)
Neural Networks, 1995. Proceedings., IEEE International Conference on
, pp. 476-481
-
-
Tan, K.1
-
32
-
-
0031187547
-
How people revisit web pages: Emprical findings and implications for the design of history systems
-
Tauscher, L. & Greenberg, S. 1997, 'How people revisit web pages: emprical findings and implications for the design of history systems,' International Journal of Human Computer Studies, vol. 47, no. 1, pp. 97-138.
-
(1997)
International Journal of Human Computer Studies
, vol.47
, Issue.1
, pp. 97-138
-
-
Tauscher, L.1
Greenberg, S.2
-
33
-
-
0022129862
-
Identity verification through keyboard characteristics
-
Umphress, D. & Williams, G. 1985, 'Identity verification through keyboard characteristics,' International Journal of Man Machine Studies, vol. 23, no. 3, pp. 263-273. (Pubitemid 16218123)
-
(1985)
International Journal of Man-Machine Studies
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.1
Williams, G.2
-
34
-
-
69949085708
-
Automated stress detection using keystroke and linguistic features: An exploratory study
-
Vizer, L. M., Zhou, L. & Sears, A. 2009, 'Automated stress detection using keystroke and linguistic features: An exploratory study,' International Journal of Human-Computer Studies, vol. 67, no. 10, pp. 870-886.
-
(2009)
International Journal of Human-Computer Studies
, vol.67
, Issue.10
, pp. 870-886
-
-
Vizer, L.M.1
Zhou, L.2
Sears, A.3
-
35
-
-
70350234989
-
Behavioural biometrics: A survey and classification
-
Yampolskiy, R. V. & Govindaraju, V. 2008, 'Behavioural biometrics: a survey and classification,' Int. J. Biometrics, vol. 1, no. 1, pp. 81-113.
-
(2008)
Int. J. Biometrics
, vol.1
, Issue.1
, pp. 81-113
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
|