Behavioural profiling authentication based on trajectory based anomaly detection model of user’s mobility

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Behavioural profiling and biometry are an interesting concept connected with authentication that have appeared in scientific literature and business world. Those methods indisputably offer new possibilities such as constant authentication and multi-user classification, but their taxonomy and definitions are not as clarified as it is for traditional authentication factors. The approach presented provides in this work provides an example of behavioural authentication model tested on a large dataset, focusing on one aspect of user behaviour - mobility, which can be adjusted to include other aspects in user behavioural authentication model. Also possible applications and extensions to the model are proposed.

Cite

CITATION STYLE

APA

Kałużny, P. (2017). Behavioural profiling authentication based on trajectory based anomaly detection model of user’s mobility. In Lecture Notes in Business Information Processing (Vol. 303, pp. 242–254). Springer Verlag. https://doi.org/10.1007/978-3-319-69023-0_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free