The assesment of the identification capabilities of features of the user interacts with a computer mouth

This article discusses the problem of Identity Theft Protection from unauthorized access in computer system. The method of user identification by features of user interacts with computer mouse based on a monitoring of subject activities and using Bayesian networks for identification decision making.

Saved in:
Bibliographic Details
Published inVestnik SibADI (Online) no. 5(45); pp. 106 - 113
Main Authors R. V. Borisov, D. N. Zverev, A. Ye. Sulavko, V. Yu. Pisarenko
Format Journal Article
LanguageRussian
Published Siberian State Automobile and Highway University 01.08.2017
Subjects
Online AccessGet full text
ISSN2071-7296
2658-5626
DOI10.26518/2071-7296-2015-5(45)-106-113

Cover

More Information
Summary:This article discusses the problem of Identity Theft Protection from unauthorized access in computer system. The method of user identification by features of user interacts with computer mouse based on a monitoring of subject activities and using Bayesian networks for identification decision making.
ISSN:2071-7296
2658-5626
DOI:10.26518/2071-7296-2015-5(45)-106-113