Quickest intrusion detection in mobile active user authentication.
Pramuditha PereraVishal M. PatelPublished in: BTAS (2016)
Keyphrases
- intrusion detection
- user authentication
- information security
- intrusion detection system
- anomaly detection
- network security
- network traffic
- network intrusion detection
- computer security
- keystroke dynamics
- high detection rate
- data mining techniques
- data mining
- security analysis
- security issues
- network intrusion
- security requirements
- detecting anomalous
- alert correlation
- data sets
- network attacks
- lightweight
- principal component analysis
- authentication protocol
- object detection
- semi supervised