2021 IEEE International Conference on Information Communication and Software Engineering (ICICSE) 2021
DOI: 10.1109/icicse52190.2021.9404100
|View full text |Cite
|
Sign up to set email alerts
|

Network User Behavior Authentication Based on Hidden Markov Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…In addition, the parameters, such as the time window in continuous trust evaluation, are set manually and lack adaptivity [2][3][4][5][6][7]. At present, research on trust evaluation models mainly can be mainly divided into two categories based on multi-attribute evaluation models [8][9][10] and machine learning models [11], both of which attach importance to the mining of multidimensional historical behavioral evidence information of network entities and the continuity and adaptiveness of the trust evaluation process. However, these methods lack the study of historical behavioral data time windows.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the parameters, such as the time window in continuous trust evaluation, are set manually and lack adaptivity [2][3][4][5][6][7]. At present, research on trust evaluation models mainly can be mainly divided into two categories based on multi-attribute evaluation models [8][9][10] and machine learning models [11], both of which attach importance to the mining of multidimensional historical behavioral evidence information of network entities and the continuity and adaptiveness of the trust evaluation process. However, these methods lack the study of historical behavioral data time windows.…”
Section: Introductionmentioning
confidence: 99%