Understanding users' keystroke patterns for computer access security.
Aykut GüvenIbrahim SogukpinarPublished in: Comput. Secur. (2003)
Keyphrases
- access control
- access control mechanism
- computer users
- information access
- access requests
- multiple users
- mobile internet
- unauthorized access
- mobile computing environment
- security policies
- information security
- user requests
- mobile devices
- user participation
- easily accessible
- user interface
- web interface
- computer systems
- user access
- personal data
- usage patterns
- security issues
- security requirements
- network security
- user interaction
- end users
- social media
- information systems
- computer security
- security systems
- social networks
- query interface
- personal information
- information seeking
- information resources
- security risks
- intrusion detection