Survey of influential user identification techniques in online social networks

R Rabade, N Mishra, S Sharma - … on Intelligent Informatics (ISI'13), August …, 2014 - Springer
… of various techniques for Influential User identification. The paper also includes some
techniques that are based on structural properties of online social networks and those techniques

A simulation evaluation study of neural network techniques to computer user identification

MS Obaidat, B Sadoun - Information Sciences, 1997 - Elsevier
user based on the typing technique of the user. The intercharacter time intervals measured as
the user … with traditional pattern recognition techniques to classify the user with good results…

[PDF][PDF] Spatio-temporal techniques for user identification by means of GPS mobility data

L Rossi, J Walker, M Musolesi - EPJ Data Science, 2015 - Springer
technique for the identification of users from location information that are not included in the
original dataset used for extracting the user … an identification attack based on the techniques

Patient identification techniques–approaches, implications, and findings

L Riplinger, J Piera-Jiménez… - Yearbook of medical …, 2020 - thieme-connect.com
techniques that use threshold limits [7] [31]. The complexity of such algorithms varies widely,
may be vendor-specific and dependent on the customization added to the base installation …

Session identification techniques used in web usage mining: A systematic mapping of scholarly literature

B Fatima, H Ramzan, S Asghar - Online Information Review, 2016 - emerald.com
identification techniques used in WUM process. In this paper, we will critically review the
state-of-the-art session identification techniques … , user identification, and session identification. …

An evaluation of product identification techniques for mobile phones

F Von Reischach, F Michahelles, D Guinard… - … –INTERACT 2009: 12th …, 2009 - Springer
… The NFC tag scan (NFC) is perceived as the easiest-to-use identification technique with an
average … identification techniques are according to the user ratings significantly harder to use. …

Identification of user patterns in social networks by data mining techniques: Facebook case

AS Bozkır, S Güzin Mazman… - … Convergence and Social …, 2010 - Springer
… As stated previously, various data mining techniques are employed during the analyses and
… method among the data mining techniques due to the ease of use and visual interpretation …

Users' fingerprinting techniques from TCP traffic

L Vassio, D Giordano, M Trevisan, M Mellia… - Proceedings of the …, 2017 - dl.acm.org
… Core domains are clearly better characterizing and more important for user identification
than Support domains, for all the three metrics. With only 70 Core domains, the range of …

A multi-technique approach for user identification through keystroke dynamics

S Haider, A Abbas, AK Zaidi - Smc 2000 conference …, 2000 - ieeexplore.ieee.org
… an invalid user gets the system access information. This paper presents a suite of techniques
for … The approaches presented in this paper use typing biometrics of a user, in addition to …

[PDF][PDF] Development of user-friendly system identification techniques

E Geerardyn - Vrije Universiteit Brussel, 2016 - researchgate.net
… In this dissertation, we focus on developing system identification techniques that are ‘user-friendly’.
The availability of easy to use and fast methods has been underlined by Gevers, (2011). In …