Cargando…
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that n...
Autores principales: | Nowak, Jakub, Holotyak, Taras, Korytkowski, Marcin, Scherer, Rafał, Voloshynovskiy, Slava |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7303709/ http://dx.doi.org/10.1007/978-3-030-50423-6_14 |
Ejemplares similares
-
Mobile authentication of copy detection patterns
por: Taran, Olga, et al.
Publicado: (2023) -
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation
por: Taran, Olga, et al.
Publicado: (2020) -
Variational Information Bottleneck for Semi-Supervised Classification
por: Voloshynovskiy, Slava, et al.
Publicado: (2020) -
Information Bottleneck Classification in Extremely Distributed Systems
por: Ullmann, Denis, et al.
Publicado: (2020) -
URL Shortening Microservice
por: Joshi, Varun
Publicado: (2017)