Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "user verification" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
Autorzy:
Kobojek, P.
Saeed, K.
Powiązania:
https://bibliotekanauki.pl/articles/307650.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
GRU networks
keystroke dynamics
LSTM networks
recurrent neural networks
user verification
Opis:
Keystroke dynamics is one of the biometrics techniques that can be used for the verification of a human being. This work briefly introduces the history of biometrics and the state of the art in keystroke dynamics. Moreover, it presents an algorithm for human verification based on these data. In order to achieve that, authors’ training and test sets were prepared and a reference dataset was used. The described algorithm is a classifier based on recurrent neural networks (LSTMand GRU). High accuracy without false positive errors as well as high scalability in terms of user count were chosen as goals. Some attempts were made to mitigate natural problems of the algorithm (e.g. generating artificial data). Experiments were performed with different network architectures. Authors assumed that keystroke dynamics data have sequence nature, which influenced their choice of classifier. They have achieved satisfying results, especially when it comes to false positive free setting.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 80-90
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
User profiling based on multiple aspects of activity in a computer system
Autorzy:
Wesołowski, T.
Kudłacik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333926.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
behavioral biometrics
user profile
intruder detection
user verification
biometria behawioralna
profil użytkownika
wykrywanie intruza
weryfikacja użytkownika
Opis:
The paper concerns behavioral biometrics, specifically issues related to the verification of the identity of computer systems users based on user profiling. The profiling method for creating a behavioral profile based on multiple aspects of user activity in a computer system is presented. The work is devoted to the analysis of user activity in environments with a graphical user interface GUI. Mouse activity, keyboard and software usage are taken into consideration. Additionally, an attempt to intrusion detection based on the proposed profiling method and statistical measures is performed. Preliminary studies show that the proposed profiling method could be useful in detecting an intruder masquerading as an authorized user of the computer system. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2014, 23; 121-130
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data clustering for the block profile method of intruder detection
Autorzy:
Wesolowski, T.
Kudlacik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333027.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user-profiles
intruder detection
computer security
user verification
profil użytkownika
wykrywanie intruza
bezpieczeństwo komputera
weryfikacja użytkownika
Opis:
The paper concerns the problem of computer security and intrusion detection. In particular the problem of detecting the masqueraders – intruders who pretend to be authorized users of computer systems. The article presents an improvement of the block profile method of intruder detection for computer systems. As a base for the work the block profiles were taken and the clustering of the block profiles data was performed. The aim was to detect the masqueraders within the test data. The problem of computer security is particularly important in medical applications. Activities of intruder can distort the data stored in medical databases and analyzed by the medical expert systems or decision support systems and thus make it difficult to support the diagnosis of diseases. For this reason it is necessary protect the medical computer systems from unauthorized access. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2013, 22; 209-216
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Features reduction for computer user profiling based on mouse activity
Autorzy:
Palys, M.
Wesołowski, T. E.
Powiązania:
https://bibliotekanauki.pl/articles/334021.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user profile
intruder detection
mouse activity
user verification
profil użytkownika
wykrywanie intruza
aktywność myszy
weryfikacja użytkownika
Opis:
The article is related to the computer systems security and to the problem of detecting the masqueraders, intruders who pretend to be legitimate users of computer systems, in particular. The research concerns computer user verification based on analysis of the mouse activity in computer system. The article presents an improvement of user verification method by introducing a new method of user profiling. The new user profiling method is based on the reduced number of features without the loss of information is introduced. The presented method of user profiling allows to simplify and speed up a user’s activity data analysis and is not causing the deterioration of intrusion detection. Additionally, a method of aggregating mouse activity basic events into a higher level events is described. This article presents the preliminary research and conclusions.
Źródło:
Journal of Medical Informatics & Technologies; 2015, 24; 45-51
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hybrid verification method based on finger-knuckle analysis and keystroke dynamics
Autorzy:
Wesolowski, T. E.
Safaverdi, H.
Doroz, R.
Wrobel, K.
Powiązania:
https://bibliotekanauki.pl/articles/333719.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
user verification
keystroke dynamics
finger-knuckle analysis
weryfikacja użytkownika
dynamika pisania na klawiaturze
analiza palców
Opis:
The increasing number of personal data leaks becomes one of the most important security issues hence the need to develop modern computer user verification methods. In the article, a potential of biometric methods fusion for continuous user verification was assessed. A hybrid approach for user verification based on fusion of keystroke dynamics and knuckle images analysis was presented. Verification is performed by a classification module where an ensemble classifier was used to verify the identity of a user. A proposed classifier works on a database which comprises of knuckle images and keyboard events for keystroke dynamics. The proposed approach was tested experimentally. The obtained results confirm that the proposed hybrid approach performs better than methods based on single biometric feature hence the introduced method can be used for increasing a protection level of computer resources against forgers and impostors. The paper presents results of preliminary research conducted to assess the potential of biometric methods fusion.
Źródło:
Journal of Medical Informatics & Technologies; 2017, 26; 26-36
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
User verification based on the analysis of keystrokes while using various software
Autorzy:
Wesołowski, T. E.
Porwik, P.
Powiązania:
https://bibliotekanauki.pl/articles/333083.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Śląski. Wydział Informatyki i Nauki o Materiałach. Instytut Informatyki. Zakład Systemów Komputerowych
Tematy:
keystroke analysis
free text analysis user profile
intruder detection
user verification
analiza klawiszy
analiza tekstu
wykrywanie intruza
weryfikacja użytkownika
Opis:
The article presents the new approach to a computer users verification. The research concerns an analysis of user’s continuous activity related to a keyboard used while working with various software. This type of analysis constitutes a type of free-text analysis. The presented method is based on the analysis of users activity while working with particular computer software (e.g. text editors, utilities). A method of computer user profiling is proposed and an attempt to intrusion detection based on k-NN classifier is performed. The obtained results show that the introduced method can be used in the intrusion detection and monitoring systems. Such systems are especially needed in medical facilities where sensitive data are processed.
Źródło:
Journal of Medical Informatics & Technologies; 2015, 24; 13-22
1642-6037
Pojawia się w:
Journal of Medical Informatics & Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies