A prudent based approach for compromised user credentials detection.
Adnan AminBabar ShahSajid AnwarFeras N. Al-ObeidatAsad Masood KhattakAwais AdnanPublished in: Clust. Comput. (2018)
Keyphrases
- end users
- user interface
- automatic detection
- detection algorithm
- information systems
- relevance feedback
- detection method
- user interaction
- user requirements
- user satisfaction
- detection accuracy
- false positives
- anomaly detection
- access control
- object detection
- user interests
- detection rate
- query formulation
- real time
- false alarms
- multiple users
- distributed environment
- event detection
- user profiles
- recommender systems
- neural network