An internal intrusion detection and protection system by using data mining and forensic techniques

FY Leu, KL Tsai, YT Hsiao, CT Yang - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
Currently, most computer systems use user IDs and passwords as the login patterns to
authenticate users. However, many people share their login patterns with coworkers and …

[PDF][PDF] A Technical Survey on Internal Intrusion Detection and Protection System Using Data Mining and Forensics Techniques

SB Wankar - 2018 - academia.edu
There are distinctive approaches to ensure the data and also the systems from attackers.
Firewalls are utilized to secure passwords according to require. Commonly these are …

[PDF][PDF] IIDS

D Gupta, K Gade, K Gade, P Yelwande - International Journal of Advance …, 2018 - ijarest.org
International Journal of Advance Research in Engineering, Science & Technology Page 1
International Journal of Advance Research in Engineering, Science & Technology e-ISSN …

Keystroke dynamics-based user authentication by Japanese old poems

T TSUJIMOTO, Y KANEKO - ITC-CSCC: International Technical …, 2015 - dbpia.co.kr
Needless to say, computer systems should be more secure for our safe life and society
nowadays. A keystroke dynamics-based user authentication is known as one of potentially …

[引用][C] Internal Intrusion Detection System and Protection using Data Mining and Forensic Methodology

RV Shivaji