User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …

Information systems research for smart sustainable mobility: A framework and call for action

W Ketter, K Schroer… - Information Systems …, 2023 - pubsonline.informs.org
Transportation is a backbone of modern globalized societies. It also causes approximately
one third of all European Union and US greenhouse gas emissions, represents a major …

[HTML][HTML] Unraveling juxtaposed effects of biometric characteristics on user security behaviors: A controversial information technology perspective

J Zhang, Z Liu, XR Luo - Decision Support Systems, 2024 - Elsevier
Biometric authentication has become ubiquitous and profoundly impacts decision-making
for both individuals and firms. Despite its extensive implementation, there is a discernible …

Behavior-based tracking: Exploiting characteristic patterns in DNS traffic

D Herrmann, C Banse, H Federrath - Computers & Security, 2013 - Elsevier
We review and evaluate three techniques that allow a passive adversary to track users who
have dynamic IP addresses based on characteristic behavioral patterns, ie, without cookies …

Behavioral profiling method and system to authenticate a user

KM Moritz, SS Aultman, JJA Campbell… - US Patent …, 2016 - Google Patents
Methods and systems for behavioral profiling, and in par ticular, utilizing crowd-managed
data architectures to store and manage that profile, are described. In some embodi ments, a …

An investigation of email processing from a risky decision making perspective

R Chen, J Wang, T Herath, HR Rao - Decision Support Systems, 2011 - Elsevier
The prevalence of cyber crimes has threatened the business model enabled by email. Users
have to evaluate email related risks before forming their attitude and read intention toward …

Behavior analysis for electronic commerce trading systems: A survey

P Zhao, Z Ding, M Wang, R Cao - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of the Internet and the continuous progress of computer science
and technology, Internet-based online trading has developed rapidly and improved the …

Tracking users on the internet with behavioral patterns: Evaluation of its practical feasibility

C Banse, D Herrmann, H Federrath - IFIP International Information Security …, 2012 - Springer
Traditionally, service providers, who want to track the activities of Internet users, rely on
explicit tracking techniques like HTTP cookies. From a privacy perspective behavior-based …

An artificial neural network classification approach for improving accuracy of customer identification in e-commerce

NS Safa, NA Ghani, MA Ismail - Malaysian Journal of Computer …, 2014 - jml.um.edu.my
With the advancesin Web-based oriented technologies, experts are able to capture user
activities on the Web. Users' Web browsing behavior is used for user identification …

Analyzing characteristic host access patterns for re-identification of web user sessions

D Herrmann, C Gerber, C Banse… - … Security Technology for …, 2012 - Springer
An attacker, who is able to observe a web user over a long period of time, learns a lot about
his interests. It may be difficult to track users with regularly changing IP addresses, though …