Proceedings of the 50th Hawaii International Conference on System Sciences (2017) 2017
DOI: 10.24251/hicss.2017.487
|View full text |Cite
|
Sign up to set email alerts
|

Insider Misuse Identification using Transparent Biometrics

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…• Indirect HCI-based biometrics may be considered as an extension of the second category. It considers a person's indirect interaction behavior, by monitoring lowlevel computer events (e.g., battery usage) [33], stack traces [34], application audit [35], or network traffic logs [36], or mutual interaction analysis (e.g., completely automated public Turing test to tell computers and humans apart -CAPTCHA) [37].…”
Section: Behavioral Biometricsmentioning
confidence: 99%
“…• Indirect HCI-based biometrics may be considered as an extension of the second category. It considers a person's indirect interaction behavior, by monitoring lowlevel computer events (e.g., battery usage) [33], stack traces [34], application audit [35], or network traffic logs [36], or mutual interaction analysis (e.g., completely automated public Turing test to tell computers and humans apart -CAPTCHA) [37].…”
Section: Behavioral Biometricsmentioning
confidence: 99%