[HTML][HTML] An approach to detect user behaviour anomalies within identity federations

AG Martín, M Beltrán, A Fernández-Isabel… - computers & …, 2021 - Elsevier
Abstract User and Entity Behaviour Analytics (UEBA) mechanisms rely on statistical
techniques and Machine Learning to determine when a significant deviation from patterns or …

Passphrase and keystroke dynamics authentication: Usable security

B Bhana, S Flowerday - Computers & Security, 2020 - Elsevier
It was found that employees spend a total of 2.25 days within 60 days on password-related
activities. The time consumed by this is unproductive and has a negative impact on usability …

Identity management for Internet of Things: Concepts, challenges and opportunities

B Cremonezi, AB Vieira, J Nacif, EF Silva… - Computer …, 2024 - Elsevier
The number of connected devices is growing exponentially, fueling the rise of diverse new
Internet of Things (IoT) applications. While the benefits of IoT for society are undeniable, the …

Identification of trusted interactive behavior based on mouse behavior considering web User's emotions

Q Yi, S Xiong, B Wang, S Yi - International Journal of Industrial Ergonomics, 2020 - Elsevier
Under existing network security technology, it is still possible for hackers to impersonate
legitimate users and invade a system for malicious destruction. Therefore, this study …

[PDF][PDF] Applying clustering to predict attackers trace in deceptive ecosystem by harmonizing multiple decoys interactions logs

J Pateria, L Ahuja, S Som, A Seth - Int. J. Inf. Technol. Comput. Sci, 2023 - academia.edu
Bluff and truth are major pillars of deception technology. Deception technology majorly relies
on decoygenerated data and looks for any behavior deviation to flag that interaction as an …

Unsupervised multi-stage attack detection framework without details on single-stage attacks

J Shin, SH Choi, P Liu, YH Choi - Future Generation Computer Systems, 2019 - Elsevier
Majority of network attacks currently consist of sophisticated multi-stage attacks, which break
down network attacks into several single-stage attacks. The early multi-stage attack …

MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices

J Li, Q Yi, MK Lim, S Yi, P Zhu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Continuous authentication based on behavioral biometrics is effective and crucial as user
behaviors are not easily copied. However, relying solely on one behavioral biometric limits …

Holistic authentication framework for virtual agents; UK banking industry

HH Hettiarachchige, H Jahankhani - Challenges in the IoT and Smart …, 2021 - Springer
The exponential growth and advancements of information technology and artificial
intelligence significantly enhance the capabilities of virtual agents. This creates …

CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments

S Wang, F Dong, H Yang, J Xu, H Wang - arXiv preprint arXiv:2408.16515, 2024 - arxiv.org
Ransomware attacks have emerged as one of the most significant cybersecurity threats.
Despite numerous proposed detection and defense methods, existing approaches face two …

Leveraging machine learning techniques to identify deceptive decoy documents associated with targeted email attacks

B Sun, T Ban, C Han, T Takahashi, K Yoshioka… - IEEE …, 2021 - ieeexplore.ieee.org
Detecting and preventing targeted email attacks is a long-standing challenge in
cybersecurity research and practice. A typical targeted email attack capitalizes on a …