A correlation framework for continuous user authentication using data mining

The increasing security breaches revealed in recent surveys and security threats reported in the media reaffirms the lack of current security measures in IT systems. While most reported work in this area has focussed on enhancing the initial login stage in order to counteract against unauthorised ac...

Full description

Bibliographic Details
Main Author: Singh, Harjit
Other Authors: Lines, B. M.
Published: University of Plymouth 2003
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412298