50,645 Hits in 4.1 sec

Profiling and Identifying Individual Users by Their Command Line Usage and Writing Style

Darusalam Darusalam, Helen Ashman
2018 Knowledge Engineering and Data Science  
This research used the n-gram analysis method for characterizing user's style, and can potentially provide accurate user identification.  ...  There are five participants involved in the investigation for formal language user identification.  ...  One example of formal language is command line history, where the user interacts with the computer through a command line.  ... 
doi:10.17977/um018v1i22018p55-63 fatcat:kbfp4vpfs5apzdelubc44rljnq

Digital Forensic Practices and Methodologies for AI Speaker Ecosystems

Wooyeon Jo, Yeonghun Shin, Hyungchan Kim, Dongkyun Yoo, Donghyun Kim, Cheulhoon Kang, Jongmin Jin, Jungkyung Oh, Bitna Na, Taeshik Shon
2019 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
the user command history using a normal mobile application.  ...  As shown in Fig. 20 , the NAVER Clova Application provides a UI that shows a user the history of commands executed prior.  ...  Category Vendor AI Cloud (Packet Analysis)  ... 
doi:10.1016/j.diin.2019.04.013 fatcat:ilzpkpi3cbbo5fx7v6vqxhqx6m

MetaboAnalyst 4.0: towards more transparent and integrative metabolomics analysis

Jasmine Chong, Othman Soufan, Carin Li, Iurie Caraus, Shuzhao Li, Guillaume Bourque, David S Wishart, Jianguo Xia
2018 Nucleic Acids Research  
through the combination of multiple metabolomic datasets and (4) a Network Explorer module for integrative analysis of metabolomics, metagenomics, and/or transcriptomics data.  ...  Since the last major update in 2015, MetaboAnalyst has continued to evolve based on user feedback and technological advancements in the field.  ...  Users can now create a workflow (R command history) through the web interface, customize the workflow by changing the order of the commands or their parameters, and finally execute the workflow in batch  ... 
doi:10.1093/nar/gky310 pmid:29762782 pmcid:PMC6030889 fatcat:46mn74fabnfydgzhy6di3gakwy

A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior

W. Yurcik, Chao Liu
2005 CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005.  
With the motivation of detecting masqueraders on clusters, this work seeks to discriminate different types of users based on their command behavior -in particular, user command behavior on a multi-user  ...  public machine versus user command behavior on a high performance computing cluster.  ...  the command history until the process is done.  ... 
doi:10.1109/ccgrid.2005.1558542 dblp:conf/ccgrid/YurcikL05 fatcat:glzqql4wmfb4xbr5etwyz6s45y

Proximity User Identification Using Correlogram [chapter]

Shervin Shahidi, Parisa Mazrooei, Navid Nasr Esfahani, Mohammad Saraee
2010 IFIP Advances in Information and Communication Technology  
This paper represents a technique, applying user action patterns in order to distinguish between users and identify them.  ...  The presented approach is succeeded to detect the correct user with as high as 82.3% accuracy over a set of 52 users.  ...  In order to form each user action history, all commands used by each group were coded into integer values separately.  ... 
doi:10.1007/978-3-642-16327-2_41 fatcat:t7ay5fvxlfhv7o4ieydlqsrtse

Extracting Windows command line details from physical memory

Richard M. Stevens, Eoghan Casey
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
This paper dissects the data structures of the command prompt history and gives forensic practitioners a tool for reconstructing the Windows command history from a Windows XP memory capture.  ...  There is a need for more memory forensic techniques to extract user-entered data retained in various Microsoft Windows applications such as the Windows command prompt.  ...  Through an analysis of these results the data structures for the DOSKEY command history element, the command history buffer and several possible methods for their identification were found.  ... 
doi:10.1016/j.diin.2010.05.008 fatcat:xyjf4x5wmffjjbkvqtwiaohspm

85.5 SAC2000: Signal processing and analysis tools for seismologists and engineers [chapter]

Peter Goldstein, Doug Dodge, Mike Firpo, Lee Minner
2003 International Geophysics  
SAC has extensive, well-documented, well-tested, and well-maintained data processing and analysis capabilities, a macro programming language which allows users to develop new analysis techniques and customized  ...  SAC2000 or SAC, as many users refer to it, is a primary signal processing and analysis tool for a large portion of the international seismological research and engineering communities including academic  ...  window before reading the data, a DELETECHANNEL command which allows user to eliminate selected channels from data in memory, and a history command for reviewing recently executed commands.  ... 
doi:10.1016/s0074-6142(03)80284-x fatcat:cyc4bxfq25ez3ep747bubneowe

Artificial Intelligence to Classify and Detect Masquerading Users on HPC Systems from Shell Histories

Kirby Kuznia, Dhruvil Shah, Gil Speyer, Jason Yalim
2022 Practice and Experience in Advanced Research Computing  
By default, bash shell histories are recorded up to a certain number of commands.  ...  This study documents a novel analysis of these prospective datasets by training two different machine learning methods on typical shell behavior as to detect a masquerading user.  ...  The authors also acknowledge Eric Tannehill's diligent work in first identifying the masquerading user, ultimately enabling this study.  ... 
doi:10.1145/3491418.3535187 fatcat:cfj2e5xjkve5jhbzyvvhevpdwq


João Felipe Pimentel, Leonardo Murta, Vanessa Braganholo, Juliana Freire
2017 Proceedings of the VLDB Endowment  
During the demo, we will show how noWorkflow collects and manages provenance, as well as how it supports the analysis of computational experiments.  ...  Users can interact with noWorkflow through three interfaces: command line, an IPython extension that interacts with Jupyter Notebook, and a web-based visualization tool.  ...  If the derivation history is not important, and the user just wants to list all trials with their command lines and durations, she can run now list.  ... 
doi:10.14778/3137765.3137789 fatcat:lmjulxw7yjhbtpne57jwdld3ym

Page 83 of Hewlett-Packard Journal Vol. 38, Issue 11 [page]

1987 Hewlett-Packard Journal  
Included in these features are executable history stacks, centralized scanner/parser (for language localization), system and user defined variables with expression evaluators, command files, and file search  ...  The CI is the part of the user interface responsible for reading user input, executing the command, and properly handling any errors.  ... 

BioFlow: a web based workflow management software for design and execution of genomics pipelines

Harold Garner, Ashwin Puthige
2014 Source Code for Biology and Medicine  
The tool should also keep track of all the files generated and maintain a history of user activities.  ...  Checking results and task completion requires users to remotely login to their servers and run commands to identify process status.  ...  Command Line tools are added through the Add Tools page in BioFlow. Here, it shows the addition of a tool to the category "Converter" with the command line "samtools view".  ... 
doi:10.1186/1751-0473-9-20 pmcid:PMC4179862 fatcat:ixdm4focxjdihbghw56g3lc66m

Smart Home Forensics—Data Analysis of IoT Devices

Soram Kim, Myungseo Park, Sehoon Lee, Jongsung Kim
2020 Electronics  
Therefore, data collection from different smart home devices and identification and analysis of data that can be used in digital forensics is crucial.  ...  These devices can be remotely controlled through controllers such as smartphones and smart speakers.  ...  Examples of data sources in theses scenarios include smart home devices, movements, voice commands, and the call history of incident responses; (c) Performing correlational analysis for obtaining user  ... 
doi:10.3390/electronics9081215 fatcat:nfcpqr334ffubpebiu66pdyhsm

Supporting virtual documents in just-in-time hypermedia systems

Li Zhang, Michael Bieber, David Millard, Vincent Oria
2004 Proceedings of the 2004 ACM symposium on Document engineering - DocEng '04  
Many analytical or computational applications, especially legacy systems, create documents and display screens in response to user queries "dynamically" or in "real time".  ...  This paper focuses on the specific challenges faced in hypermedia support for virtual documents of dynamic hypermedia functionality, dynamic regeneration, and dynamic anchor re-identification and re-location  ...  We shall investigate extending our approach to incorporate user profiles and document context, for regeneration, re-identification and re-location.  ... 
doi:10.1145/1030397.1030405 dblp:conf/doceng/ZhangBMO04 fatcat:tdoat2fynbakhbbekcdf3vdrvu

Designing the handheld maritime communicator

Jesper Kjeldskov, Jan Stage
2003 Proceedings of the 2003 conference on Designing for user experiences - DUX '03  
Evaluating the prototype in a high-fidelity ship simulator, prospective users validated the overall design, but also identified a number of usability problems that need to be addressed.  ...  Designing the user experience of the Handheld Maritime Communicator was a particular challenge because it targets a highly specialized context of use and because poor design could potentially become a  ...  Command sequences and structures in communication The primary outcome of the video analysis was the identification of patterns in the sequence of commands issued by the captain and common structures in  ... 
doi:10.1145/997078.997080 fatcat:qqtrjudytra7pelz4ex6w7jot4

BOLDigger – a Python package to identify and organise sequences with the Barcode of Life Data systems

Dominik Buchner, Florian Leese
2020 Metabarcoding and Metagenomics  
DNA metabarcoding workflows produce hundreds to ten-thousands of Operational Taxonomic Units (OTUs) or Exact Sequence Variants (ESVs) per analysis.  ...  While an application programme interface (API) exists to query data in large batches, no information on the many and important unpublished data are obtained through the API.  ...  BOLDigger can query all three databases of BOLD by using the "BOLD identification engine" command.  ... 
doi:10.3897/mbmg.4.53535 fatcat:icpxl3frsbadtbzuipweyayd2q
« Previous Showing results 1 — 15 out of 50,645 results