R Ranjan, SS Kumar - High-Confidence Computing, 2022 - Elsevier
Research-based on user behavior analysis for authentication is the motivation for this research. We move ahead using a behavioral approach to identify malicious users and …
Big data and cloud computing technology appeared on the scene as new trends due to the rapid growth of social media usage over the last decade. Big data represent the immense …
AH Lashkari, M Chen… - Journal of Cyber …, 2019 - journals.riverpublishers.com
In the face of escalating global Cybersecurity threats, having an automated forewarning system that can find suspicious user profiles is paramount. It can work as a prevention …
As it covers a wide spectrum, the research literature of human-computer interaction (HCI) studies has a rich and multi-disciplinary content where there are limited studies …
S Abarna, JI Sheeba, S Jayasrilakshmi… - … applications of artificial …, 2022 - Elsevier
Due to Coronavirus diseases in 2020, all the countries departed into lockdown to combat the spread of the pandemic situation. Schools and institutions remain closed and students' …
V Labayen, E Magana, D Morató, M Izal - Computer Networks, 2020 - Elsevier
The daily deployment of new applications, along with the exponential increase in network traffic, entails a growth in the complexity of network analysis and monitoring. Conversely, the …
User behaviour analytics (UBA) systems offer sophisticated models that capture users' behaviour over time with an aim to identify fraudulent activities that do not match their …
M Ussath, D Jaeger, F Cheng… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
The number of attacks that use sophisticated and complex methods increased lately. The main objective of these attacks is to largely infiltrate the target network and to stay …
This paper formulates the problem of building a context-aware predictive model based on user diverse behavioral activities with smartphones. In the area of machine learning and …