Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fundamentals of speech recognition
Fundamentals of speech recognition
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
Algorithms on strings, trees, and sequences: computer science and computational biology
Algorithms on strings, trees, and sequences: computer science and computational biology
The Hierarchical Hidden Markov Model: Analysis and Applications
Machine Learning
Expert Systems with Applications: An International Journal
FAQ-master: an ontological multi-agent system for web FAQ services
WSEAS Transactions on Information Science and Applications
FAQtory: A framework to provide high-quality FAQ retrieval systems
Expert Systems with Applications: An International Journal
A cloud of FAQ: A highly-precise FAQ retrieval system for the Web 2.0
Knowledge-Based Systems
Hi-index | 0.00 |
This paper presents a method for automatically constructing a sophisticated user/process profile from traces of user/process behavior. User profile is encoded by means of a Hierarchical Hidden Markov Model (HHMM). The HHMM is a well formalized tool suitable to model complex patterns in long temporal or spatial sequences. The method described here is based on a recent algorithm, which is able to synthesize the HHMM structure from a set of logs of the user activity. The algorithm follows a bottom-up strategy, in which elementary facts in the sequences (motives) are progressively grouped, thus building the abstraction hierarchy of a HHMM, layer after layer. The method is firstly evaluated on artificial data. Then a user identification task, from real traces, is considered. A preliminary experimentation with several different users produced encouraging results.