Works matching DE "MASQUERADERS (Computer users)"
Results: 17
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 6, p. 583, doi. 10.1007/s10207-014-0238-9
- By:
- Publication type:
- Article
Unsupervised anomaly detection within non-numerical sequence data by average index difference, with application to masquerade detection.
- Published in:
- Applied Stochastic Models in Business & Industry, 2014, v. 30, n. 5, p. 632, doi. 10.1002/asmb.2057
- By:
- Publication type:
- Article
Development of a Scale to Investigate Cybervictimization among Online Social Utility Members.
- Published in:
- Contemporary Educational Technology, 2010, v. 1, n. 1, p. 46
- By:
- Publication type:
- Article
TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS.
- Published in:
- Parallel Processing Letters, 2011, v. 21, n. 1, p. 21, doi. 10.1142/S0129626411000047
- By:
- Publication type:
- Article
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 2, p. 164, doi. 10.1109/TDSC.2014.2327966
- By:
- Publication type:
- Article
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 3, p. 557, doi. 10.1007/s00500-016-2278-8
- By:
- Publication type:
- Article
Fuzzy approach for intrusion detection based on user's commands.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 7, p. 2705, doi. 10.1007/s00500-015-1669-6
- By:
- Publication type:
- Article
An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/1210938
- By:
- Publication type:
- Article
Cyberbullying in High Schools: A Study of Students' Behaviors and Beliefs about This New Phenomenon.
- Published in:
- Journal of Aggression, Maltreatment & Trauma, 2010, v. 19, n. 4, p. 372, doi. 10.1080/10926771003788979
- By:
- Publication type:
- Article
OLG Düsseldorf: Zulässige Datenverarbeitung durch Facebook.
- Published in:
- Computer und Recht, 2019, v. 35, n. 11, p. 714, doi. 10.9785/cr-2019-351109
- Publication type:
- Article
Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hocnetworks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2612, doi. 10.1002/sec.1506
- By:
- Publication type:
- Article
Sequence-based masquerade detection for different user groups.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1265, doi. 10.1002/sec.1080
- By:
- Publication type:
- Article
An improved discrete logarithm-based multisignature scheme.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 9, p. 969, doi. 10.1002/sec.380
- By:
- Publication type:
- Article
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 8, p. 863, doi. 10.1002/sec.311
- By:
- Publication type:
- Article
Security analysis and enhancements of an improved multi-factor biometric authentication scheme.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 8, p. 1, doi. 10.1177/1550147717724308
- By:
- Publication type:
- Article
Genomic analysis identifies masqueraders of full‐term cerebral palsy.
- Published in:
- Annals of Clinical & Translational Neurology, 2018, v. 5, n. 5, p. 538, doi. 10.1002/acn3.551
- By:
- Publication type:
- Article
A Fuzzy Approach to User-level Intrusion Detection.
- Published in:
- International Journal of Fuzzy Systems, 2021, v. 23, n. 3, p. 862, doi. 10.1007/s40815-020-00947-1
- By:
- Publication type:
- Article