Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History.
Michio KunimotoTakao OkuboPublished in: J. Inf. Process. (2023)
Keyphrases
- information access
- easily accessible
- user access
- benchmark datasets
- information processing
- disseminate information
- information sources
- significant improvement
- spatial information
- information sharing
- multiple sources
- historical information
- information delivery
- databases
- access control
- user interaction
- computational cost
- preprocessing
- data analysis
- data mining
- physical location