Login / Signup
Active authentication using file system decoys and user behavior modeling: results of a large scale study.
Jonathan Voris
Yingbo Song
Malek Ben Salem
Shlomo Hershkop
Salvatore J. Stolfo
Published in:
Comput. Secur. (2019)
Keyphrases
</>
user behavior
file system
user interaction
online advertising
user activities
user preferences
user experience
browsing behavior
log analysis
contextual factors
user behavior patterns
information retrieval
continuous media
web usage mining
social networking
business processes
association rules
website