2016
DOI: 10.1007/s12008-016-0360-1
|View full text |Cite
|
Sign up to set email alerts
|

Experimenting with masquerade detection via user task usage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…In this work, we have tested our proposed method on the masquerade detection domain. Some examples of work in this domain are Maxion and Townsend (), Maxion (), Camiña et al (), Medina‐Pérez et al (), and Rodríguez et al (). In masquerade detection, it is easy to sample objects from the normal interaction between a user and his PC.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In this work, we have tested our proposed method on the masquerade detection domain. Some examples of work in this domain are Maxion and Townsend (), Maxion (), Camiña et al (), Medina‐Pérez et al (), and Rodríguez et al (). In masquerade detection, it is easy to sample objects from the normal interaction between a user and his PC.…”
Section: Related Workmentioning
confidence: 99%
“…Masquerade detection refers to detecting whether a given activity in a computing device is done by a legitimate device user (Rodríguez et al, ). This problem, along with other anomaly detection scenarios, can be approached as a one‐class classification problem.…”
Section: Experimental Setup: a Masquerade Detection Settingmentioning
confidence: 99%
See 2 more Smart Citations