Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach.
Adnan AminSajid AnwarBabar ShahAsad Masood KhattakPublished in: ICCAE (2017)
Keyphrases
- detection algorithm
- detection rate
- recommender systems
- detection method
- user interface
- user oriented
- detection accuracy
- user privacy
- user input
- user centric
- user requirements
- user experience
- anomaly detection
- access control
- event detection
- user preferences
- automatic detection
- user satisfaction
- user interaction
- digital images
- relevance feedback
- information retrieval