Login / Signup
User identification through command history analysis.
Foaad Khosmood
Phillip L. Nico
Jonathan Woolery
Published in:
CICS (2014)
Keyphrases
</>
data analysis
user interface
real time
neural network
database systems
user requirements
database
data mining
artificial intelligence
search engine
website
hidden markov models
social media
web search
structural analysis