2018
DOI: 10.1007/978-3-319-73697-6_5
|View full text |Cite
|
Sign up to set email alerts
|

A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…A Decision Tree is one of the most commonly used classification algorithms in the security domain (Berrueta, Morato, Magana, et al, 2019;Molina et al, 2021). Trees provide a rule-based approach to classification, and since security relies on rules, this is often the preferred approach (Adeyemi, Razak, Salleh, et al, 2016;Ernsberger, Ikuesan, Venter, et al, 2017;Mohlala, Ikuesan & Venter, 2018). The parameters used for the DT comprised the quality measure that integrates the Gini Index, with no pruning, and a minimum number of five records per node.…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
“…A Decision Tree is one of the most commonly used classification algorithms in the security domain (Berrueta, Morato, Magana, et al, 2019;Molina et al, 2021). Trees provide a rule-based approach to classification, and since security relies on rules, this is often the preferred approach (Adeyemi, Razak, Salleh, et al, 2016;Ernsberger, Ikuesan, Venter, et al, 2017;Mohlala, Ikuesan & Venter, 2018). The parameters used for the DT comprised the quality measure that integrates the Gini Index, with no pruning, and a minimum number of five records per node.…”
Section: Decision Tree (Dt)mentioning
confidence: 99%
“…Here, the own users are recognized by their gestures It has gained high flaw rate and less exactness measure. Moreover, the security aspects also questionable in this scheme Ernsberger et al (2017) Mouse dynamics visualization system This process is executed in short duration, verification process relatively very fast Lacks in security against reply attack. Moreover, the system is operated in complex platform.…”
Section: Mouse Dynamicsmentioning
confidence: 99%
“…This method needs to be modified to make it suitable for non-intrusive continuous authentication. Ernsberger et al (2017) proposed mouse dynamics based on user identification from the angle of digital forensics. It has studied those user behavioural variances from interactions on different news websites.…”
Section: Mouse Dynamicsmentioning
confidence: 99%
“…Attribution as a forensic component is major research challenge which has led to the adoption of some scientific evidence (or the lack of it) in litigation. However, till date, the scientific committee continue to grabble with the development of a reliable process model for user and device attribution in digital forensics [144]- [147]. That notwithstanding, with the changing nature of how data keeps changing with changing technologies, a more resilient cognitive model is projected to be a future challenge given that the forensic investigation of mobile architecture still remains complicated [148].…”
Section: Open Problems and Future Challengesmentioning
confidence: 99%