System Survey: Building an Authenticity Profile


Protection techniques commonly used on information systems are regularly hacked into by malicious users. This problem is mainly due to the fact that the reliability of such systems is based on correct administration, and on system users' correct handling. A new protection policy consists in confirming authentication of a user by analyzing his behavior. Such… (More)
DOI: 10.1109/ICCCN.1998.998788


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Slides referencing similar topics