Carregant...

Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns

Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that n...

Descripció completa

Guardat en:
Dades bibliogràfiques
Publicat a:Computational Science – ICCS 2020
Autors principals: Nowak, Jakub, Holotyak, Taras, Korytkowski, Marcin, Scherer, Rafał, Voloshynovskiy, Slava
Format: Artigo
Idioma:Inglês
Publicat: 2020
Matèries:
Accés en línia:https://ncbi.nlm.nih.gov/pmc/articles/PMC7303709/
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1007/978-3-030-50423-6_14
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!