Active authentication using file system decoys and user behavior modeling: results of a large scale study

2019 ◽  
Vol 87 ◽  
pp. 101412 ◽  
Author(s):  
Jonathan Voris ◽  
Yingbo Song ◽  
Malek Ben Salem ◽  
Shlomo Hershkop ◽  
Salvatore Stolfo
1999 ◽  
Vol 27 (1) ◽  
pp. 59-70 ◽  
Author(s):  
John R. Douceur ◽  
William J. Bolosky

Sign in / Sign up

Export Citation Format

Share Document