2021
DOI: 10.1007/s10489-020-02160-x
|View full text |Cite
|
Sign up to set email alerts
|

A survey for user behavior analysis based on machine learning techniques: current models and applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(20 citation statements)
references
References 164 publications
0
20
0
Order By: Relevance
“…Data mining approaches can be applied to automatically dig information with the goal to find out some habits and tendencies. 9,10,11 In that case, the web access log file is analysed in order to divide users on the basis of a selected algorithm into several clusters. Users within the same cluster should have similar properties from the point of view of their activity in cyberspace.…”
Section: Web Users' Behaviourmentioning
confidence: 99%
“…Data mining approaches can be applied to automatically dig information with the goal to find out some habits and tendencies. 9,10,11 In that case, the web access log file is analysed in order to divide users on the basis of a selected algorithm into several clusters. Users within the same cluster should have similar properties from the point of view of their activity in cyberspace.…”
Section: Web Users' Behaviourmentioning
confidence: 99%
“…The mainstream English teaching still focuses on the traditional offline face-to-face teaching, supplemented by online network teaching, so the teaching mode is relatively single [ 1 ]. Since the teaching model innovation policies are promoted in different regions at this stage, the vigorous development of a variety of data analysis technologies has also triggered the innovative application of English Classroom Teaching [ 2 ]. Manufacturing computer-integrated manufacturing system CIMS, system scheduling, communication network system, database management system, military C3I system, and other systems are typical discrete event systems [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…Most often, phishing attacks exploit network bandwidth and connectivity, downgrading performance in systems they are compromising, whether during network-based attacks or host-based attacks, as shown in Figure 1. Consequently, phishing attacks are successful at halting, interrupting, and demoting the real-time performance of the system by draining all its resources [3].…”
Section: Introductionmentioning
confidence: 99%
“…Avoiding any one of these tenets deliberately or inadvertently might lead to open security breaches and unresolved vulnerabilities, consequently leading to a loss of credentials, reputations, and financial gains. Hence, the focus on web security against phishing attacks is necessary and must counter the latest exploitation techniques [3]. Among all cyberattacks, phishing attacks appear friendly but target financial transactions and highly confidential data.…”
Section: Introductionmentioning
confidence: 99%