Academic literature on the topic 'Masquerade detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Masquerade detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Masquerade detection"
Maestre Vidal, Jorge, and Marco Antonio Sotelo Monge. "Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features." Sensors 20, no. 7 (2020): 2084. http://dx.doi.org/10.3390/s20072084.
Full textAlmanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "An Explainable Clustering-Based Approach for Cyber Situational Awareness on Masquerade Attacks Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 2 (2024): 48–59. https://doi.org/10.5281/zenodo.15098302.
Full textElmasry, Wisam, Akhan Akbulut, and Abdul Halim Zaim. "Deep Learning Approaches for Predictive Masquerade Detection." Security and Communication Networks 2018 (August 1, 2018): 1–24. http://dx.doi.org/10.1155/2018/9327215.
Full textCoull, Scott E., and Boleslaw K. Szymanski. "Sequence alignment for masquerade detection." Computational Statistics & Data Analysis 52, no. 8 (2008): 4116–31. http://dx.doi.org/10.1016/j.csda.2008.01.022.
Full textMaxion, R. A., and T. N. Townsend. "Masquerade Detection Augmented With Error Analysis." IEEE Transactions on Reliability 53, no. 1 (2004): 124–47. http://dx.doi.org/10.1109/tr.2004.824828.
Full textMaestre Vidal, Jorge, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. "Online masquerade detection resistant to mimicry." Expert Systems with Applications 61 (November 2016): 162–80. http://dx.doi.org/10.1016/j.eswa.2016.05.036.
Full textMin, Yang, Wang Li-na, Zhang Huan-guo, and Chen Wei. "Masquerade detection using support vector machine." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 103–6. http://dx.doi.org/10.1007/bf02828627.
Full textAlmanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "Clustering-Based Cyber Situational Awareness: A Practical Approach for Masquerade Attack Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 1 (2024): 35–39. https://doi.org/10.5281/zenodo.14933955.
Full textXiao, Xi, Xinguang Tian, Qibin Zhai, and Shutao Xia. "A variable-length model for masquerade detection." Journal of Systems and Software 85, no. 11 (2012): 2470–78. http://dx.doi.org/10.1016/j.jss.2012.05.049.
Full textAgrawal, Arshi, and Mark Stamp. "Masquerade detection on GUI-based Windows systems." International Journal of Security and Networks 10, no. 1 (2015): 32. http://dx.doi.org/10.1504/ijsn.2015.068409.
Full textDissertations / Theses on the topic "Masquerade detection"
Panopoulos, Vasileios. "Near Real-time Detection of Masquerade attacks in Web applications : catching imposters using their browsing behavor." Thesis, KTH, Kommunikationsnät, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183777.
Full textWiklund, Anton. "Masquerader Detection via 2fa Honeytokens." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-106964.
Full textKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Full textBen, Salem Malek. "Towards Effective Masquerade Attack Detection." Thesis, 2012. https://doi.org/10.7916/D8J96DBT.
Full textGunasekaran, Karthic. "Probabilistic Vs. clustering analysis of modified UNIX command lines for masquerade detection." 2005. http://digital.library.okstate.edu/etd/umi-okstate-1374.pdf.
Full textBooks on the topic "Masquerade detection"
Salem, Malek Ben. Towards Effective Masquerade Attack Detection. [publisher not identified], 2012.
Find full textCopyright Paperback Collection (Library of Congress), ed. The marriage masquerade. St. Martin's Paperbacks, 2002.
Find full textBugeja, Michael J. Bonfire Masquerade: Nancy Drew: Girl Detective and the Hardy Boys: Undercover Brothers Super Mystery #5. Aladdin, 2011.
Find full textBook chapters on the topic "Masquerade detection"
Dash, Subrat Kumar, Krupa Sagar Reddy, and Arun K. Pujari. "Episode Based Masquerade Detection." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_19.
Full textLatendresse, Mario. "Masquerade Detection via Customized Grammars." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506881_9.
Full textKadala Manikoth, Swathi Nambiar, Fabio Di Troia, and Mark Stamp. "Masquerade Detection on Mobile Devices." In Computer Communications and Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92624-7_13.
Full textYung, Kwong H. "Using Feedback to Improve Masquerade Detection." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45203-4_4.
Full textSalem, Malek Ben, and Salvatore J. Stolfo. "Modeling User Search Behavior for Masquerade Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23644-0_10.
Full textSaljooghinejad, Hamed, and Wilson Naik Bhukya. "Layered Security Architecture for Masquerade Attack Detection." In Data and Applications Security and Privacy XXVI. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31540-4_19.
Full textYu, Feng, and Min Wang. "Applying Frequent Episode Algorithm to Masquerade Detection." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85930-7_63.
Full textBen Salem, Malek, and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_3.
Full textChandrasekara, Pranieth, Hasini Abeywardana, Sammani Rajapaksha, Sanjeevan Parameshwaran, and Kavinga Yapa Abeywardana. "Behavior and Biometrics Based Masquerade Detection Mobile Application." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52243-8_32.
Full textSaljooghinejad, Hamed, and Wilson Naik Rathore. "Multi Application User Profiling for Masquerade Attack Detection." In Advances in Computing and Communications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22714-1_70.
Full textConference papers on the topic "Masquerade detection"
Berdychowski, Matt, and Sergio A. Salinas Monroy. "Automated Detection of Masquerade Attacks with AI and Decoy Documents." In 2024 Cyber Awareness and Research Symposium (CARS). IEEE, 2024. https://doi.org/10.1109/cars61786.2024.10778670.
Full textImsand, Eric S., and John A. Hamilton Jr. "Masquerade Detection through GUIID." In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.405.
Full textStrasburg, Chris, Sandeep Krishnan, Karin Dorman, Samik Basu, and Johnny S. Wong. "Masquerade Detection in Network Environments." In 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT). IEEE, 2010. http://dx.doi.org/10.1109/saint.2010.66.
Full textYang, Min, Huanguo Zhang, and H. J. Cai. "Masquerade Detection Using String Kernels." In 2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007. http://dx.doi.org/10.1109/wicom.2007.910.
Full textImsand, Eric S., and John A. Hamilton. "GUI Usage Analysis for Masquerade Detection." In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381943.
Full textShemla, A., and V. Bineesh. "An EvABCD approach for masquerade detection." In 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET). IEEE, 2014. http://dx.doi.org/10.1109/icctet.2014.6966354.
Full textShim, Charlie Y., Jung Yeop Kim, and Rex E. Gantenbein. "Practical User Identification for Masquerade Detection." In Advances in Electrical and Electronics Engineering - IAENG Special Edition of the World Congress on Engineering and Computer Science (WCECS). IEEE, 2008. http://dx.doi.org/10.1109/wcecs.2008.14.
Full textRaveendran, Reshma, and K. A. Dhanya. "Applicability of clustering techniques on masquerade detection." In 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2014. http://dx.doi.org/10.1109/icacci.2014.6968577.
Full textDing, Yuxin, Ping Sun, Xiuyue Chen, and Changan Liu. "Masquerade Detection Based on One Class SVM." In 11th Joint Conference on Information Sciences. Atlantis Press, 2008. http://dx.doi.org/10.2991/jcis.2008.121.
Full textBhukya, Wilson Naik, G. Suresh Kumar, and Atul Negi. "A Study of Effectiveness in Masquerade Detection." In TENCON 2006 - 2006 IEEE Region 10 Conference. IEEE, 2006. http://dx.doi.org/10.1109/tencon.2006.344199.
Full text