A correlation framework for continuous user authentication using data mining
The increasing security breaches revealed in recent surveys and security threats reported in the media reaffirms the lack of current security measures in IT systems. While most reported work in this area has focussed on enhancing the initial login stage in order to counteract against unauthorised ac...
Main Author: | |
---|---|
Other Authors: | |
Published: |
University of Plymouth
2003
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412298 |