J Ho, DK Kang - Applied Intelligence, 2018 - Springer
… a unique identifier (ID) and password for authentication. … when a user tries to log in to a service with his/her ID and password… extra features for the userauthentication mechanism. One of …
S McKinney, DS Reeves - Proceedings of the 5th Annual Workshop on …, 2009 - dl.acm.org
… be successful in identifyingusers, including masqueraders. This data was used as input to a naıve Bayesclassifier to create models of user behavior. The models were then applied to …
A Malatras, D Geneiatakis, I Vakalis - International Journal of Information …, 2017 - Springer
… for user monitoring and identification, albeit impacting users’ … In this paper, we report on the feasibility of useridentification … web user activities and to rely on Multinomial NaiveBayes …
… this assumption, showing that the naiveBayesclassifiermodel is sufficient and suitable for multi-modal useridentification, even when the modalities use the same input. Moreover, the …
… Existing naiveBayesclassifier based noise detection techniques have not considered this … noise detection technique based on naiveBayesclassifier for effectively classifying users’ …
D Herrmann, R Wendolsky, H Federrath - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
… Furthermore, we show the high robustness of the classifier and find that it is able to identify … We use the accuracy of a classifier as a measure of its effectivity. This metric indicates the …
C Tang, VV Phoha - 2016 IEEE 8th International Conference on …, 2016 - ieeexplore.ieee.org
… From the table, we observe that five classifiers (Random Forest, NaiveBayes, Neural Network, kNearest Neighbors, and AdaBoost) can achieve more than 90% accuracy in …
Y Ma, S Liang, X Chen, C Jia - 2016 10th International …, 2016 - ieeexplore.ieee.org
… NaiveBayes has been used in this paper to identify the abnormal access behavior. Bayesian algorithm is … of classification and use the training sample set to generating classifier in this …
Z Wu, L Yu, H Sun, Z Guan, Z Chen - … Nanjing, China, October 13-15, 2013 …, 2013 - Springer
… This paper studies how to authenticate users with abundant rating … userauthentication scheme for recommender systems with secure personalized data under the NaiveBayesmodel. …