Login / Signup
Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User's Mobility.
Piotr Kaluzny
Published in:
BIS (Workshops) (2017)
Keyphrases
</>
anomaly detection
intrusion detection
unsupervised learning
probabilistic model
network intrusion
machine learning
genetic algorithm
pattern recognition
intrusion detection system
network traffic
network intrusion detection
computer security
normal behavior
detecting anomalies