IEEE Spectrum
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Learning users' interests by unobtrusively observing their normal behavior
Proceedings of the 5th international conference on Intelligent user interfaces
ACM SIGKDD Explorations Newsletter
Signature-Based Methods for Data Streams
Data Mining and Knowledge Discovery
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization
Data Mining and Knowledge Discovery
Fast Algorithms for Online Generation of Profile Association Rules
IEEE Transactions on Knowledge and Data Engineering
Web usage mining: discovery and applications of usage patterns from Web data
ACM SIGKDD Explorations Newsletter
Java-Based Internet Biometric Authentication System
IEEE Transactions on Pattern Analysis and Machine Intelligence
AIPR '04 Proceedings of the 33rd Applied Imagery Pattern Recognition Workshop
The Value of Intrusion Detection Systems in Information Technology Security Architecture
Information Systems Research
GHIC: A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
IEEE Transactions on Knowledge and Data Engineering
From fingerprint to writeprint
Communications of the ACM - Supporting exploratory search
The lack of a priori distinctions between learning algorithms
Neural Computation
An economic mechanism for better Internet security
Decision Support Systems
Decision Support Systems - Special issue: Intelligence and security informatics
No free lunch theorems for optimization
IEEE Transactions on Evolutionary Computation
An investigation of email processing from a risky decision making perspective
Decision Support Systems
Analyzing characteristic host access patterns for re-identification of web user sessions
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Discovering content-based behavioral roles in social networks
Decision Support Systems
Hi-index | 0.00 |
Research in biometrics suggests that the time period a specific trait is monitored over (i.e. observing speech or handwriting ''long enough'') is useful for identification. Focusing on this aspect, this paper presents a data mining analysis of the effect of observation time period on user identification based on online user behavior. We show that online identification accuracies improve with pooling user data over sessions and present results that quantify the number of sessions needed to identify users at desired accuracy thresholds. We discuss potential applications of this for verification of online user identity, particularly as part of multi-factor authentication methods.