Author of the publication

Using continuous user authentication to detect masqueraders.

, and . Inf. Manag. Comput. Secur., 11 (3): 139-145 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning temporal patterns for anomaly intrusion detection., and . SAC, page 209-213. ACM, (2002)A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.. SEC, volume 193 of IFIP Conference Proceedings, page 339-352. Kluwer, (2001)Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events., and . Recent Advances in Intrusion Detection, (1999)Using continuous user authentication to detect masqueraders., and . Inf. Manag. Comput. Secur., 11 (3): 139-145 (2003)Learning Temporal Regularities of User Behavior for Anomaly Detection., , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 143-152. Springer, (2001)A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 149-164. Kluwer, (2002)Distributed Knowledge Management for Autonomous Access Control in Computer Networks., and . ITCC (2), page 433-437. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.HIDSUR: A Hybrid Intrusion Detection System Based on Real-Time User Recognition., and . DEXA Workshop, page 41-45. IEEE Computer Society, (2000)An Access Control Model Based on Distributed Knowledge Management., and . AINA (2), page 403-406. IEEE Computer Society, (2004)