A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Identifying users with application-specific command streams
2014
2014 Twelfth Annual International Conference on Privacy, Security and Trust
This paper proposes and describes an active authentication model based on user profiles built from user-issued commands when interacting with GUI-based application. Previous behavioral models derived from user issued commands were limited to analyzing the user's interaction with the *Nix (Linux or Unix) command shell program. Human-computer interaction (HCI) research has explored the idea of building users profiles based on their behavioral patterns when interacting with such graphical
doi:10.1109/pst.2014.6890944
dblp:conf/pst/MasriWLK14
fatcat:oizpft3yrfbpzpkfq7owaff6sq