Author of the publication

Keystroke and Mouse Movement Profiling for Data Loss Prevention.

, , , and . J. Inf. Sci. Eng., 31 (1): 23-42 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-supervised Learning for False Alarm Reduction., , , , and . ICDM, volume 6171 of Lecture Notes in Computer Science, page 595-605. Springer, (2010)Detecting in-situ identity fraud on social network services: a case study on facebook., , , , and . WWW (Companion Volume), page 401-402. ACM, (2014)Clustering Model Selection for Reduced Support Vector Machines., and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 714-719. Springer, (2004)Generating the Reduced Set by Systematic Sampling., and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 720-725. Springer, (2004)Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook., , , , and . IEEE Syst. J., 11 (4): 2432-2443 (2017)Dealing with Interleaved Event Inputs for Intrusion Detection., , and . J. Inf. Sci. Eng., 35 (1): 223-242 (2019)epsilon-SSVR: A Smooth Support Vector Machine for epsilon-Insensitive Regression., , and . IEEE Trans. Knowl. Data Eng., 17 (5): 678-685 (2005)Multiclass support vector classification via coding and regression., , , , and . Neurocomputing, 73 (7-9): 1501-1512 (2010)RSVM: Reduced Support Vector Machines., and . SDM, page 1-17. SIAM, (2001)ChainSpot: Mining Service Logs for Cyber Security Threat Detection., , , , and . Trustcom/BigDataSE/ISPA, page 1867-1874. IEEE, (2016)