2022
DOI: 10.1007/978-3-031-16072-1_52
|View full text |Cite
|
Sign up to set email alerts
|

Application of the Solution for Analysis of IT Systems Users Experience on the Example of Internet Bank Usage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…To mitigate security risks, the monitoring of IS usage based on analyzing the behavioral models of users can be utilized. The company "ABC software" Ltd. has implemented this approach in the product e-StepControl [1], which is already applied for different problem domains and not only for IS users threats identification [10]. The conceptual scheme of the algorithm used in e-StepControl solution for identification of potentially malicious sessions with Markov chains is shown in Fig.…”
Section: Research Problem and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To mitigate security risks, the monitoring of IS usage based on analyzing the behavioral models of users can be utilized. The company "ABC software" Ltd. has implemented this approach in the product e-StepControl [1], which is already applied for different problem domains and not only for IS users threats identification [10]. The conceptual scheme of the algorithm used in e-StepControl solution for identification of potentially malicious sessions with Markov chains is shown in Fig.…”
Section: Research Problem and Related Workmentioning
confidence: 99%
“…At present, this classification process relies on manual efforts. To improve efficiency and make better use of time and human resources, it becomes imperative to automate this procedure using formal algorithms [10].…”
Section: Research Problem and Related Workmentioning
confidence: 99%