A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

User modeling via anomaly detection techniques for user authentication

IIMA Sulayman, A Ouda - 2019 IEEE 10th Annual Information …, 2019 - ieeexplore.ieee.org
Anomaly detection is quickly becoming a very significant tool for a variety of applications
such as intrusion detection, fraud detection, fault detection, system health monitoring, and …

Designing security user profiles via anomaly detection for user authentication

IIMA Sulayman, A Ouda - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
The ability to detect the anomalous user behavior automatically and create user profiles,
storing fresh and accurate security aspect user information, is important for systems …

Trends on computer security: Cryptography, user authentication, denial of service and intrusion detection

PDM Lara, DA Maldonado-Ruiz, SDA Díaz… - arXiv preprint arXiv …, 2019 - arxiv.org
The new generation of security threats has been promoted by digital currencies and real-
time applications, where all users develop new ways to communicate on the Internet …

Real-Time Data Generation and Anomaly Detection for Security User Profiles

IIMA Sulayman, A Ouda - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
Mostly, security user profiles are being generated from real-time sources of users' data. User
profiles generation process involves complicated and comprehensive data analysis …

Human trait analysis via machine learning techniques for user authentication

IIMA Sulayman, A Ouda - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Machine learning is an extremely important technique that has become heavily used in
different types of applications such as detection systems for fraud, intrusion or fault and …

Big data security: a progress study of current user authentication schemes

TS Algaradi, B Rama - 2018 4th International Conference on …, 2018 - ieeexplore.ieee.org
In the past few years, a rapid evolution in the ICTs has been witnessed in various aspects,
leading to a higher communication volume, and data exchange.Big Data'is one of the recent …

User authentication based on predictive applications

A Avni, F Copty, A Jarrous, S Keidar-Barner… - US Patent …, 2020 - Google Patents
In some examples, a system for authenticating users can include a processor to train a first
predictive application based on a first set of user engagements with advertisements, wherein …

Application of Machine Learning to User Behavior-Based Authentication in Smartphone and Web

M Jayabalan - Applications of Machine Learning and Deep Learning …, 2022 - igi-global.com
Authentication is the preliminary security mechanism employed in the information system to
identify the legitimacy of the user. With technological advancements, hackers with …

A contextual authentication framework for smart home environments

Y Ashibani - 2020 - library-archives.canada.ca
A smart home is one equipped with connected Internet-of-Things (IoT) devices that can be
remotely accessed and controlled. Access to smart home devices is mostly achieved …