Keyphrases
- user authentication
- real world
- intrusion detection
- information security
- intrusion detection system
- user interaction
- data sets
- wide range
- end users
- recommender systems
- access control
- security issues
- network security
- computer security
- user friendliness
- user defined
- security requirements
- sensitive data
- user preferences
- authentication systems
- data mining
- security measures
- authentication protocol
- malicious users
- increasing number of users
- encryption scheme
- user satisfaction
- user model
- smart card
- user experience
- synthetic data
- anomaly detection
- context aware
- case study