The assesment of the identification capabilities of features of the user interacts with a computer mouth
This article discusses the problem of Identity Theft Protection from unauthorized access in computer system. The method of user identification by features of user interacts with computer mouse based on a monitoring of subject activities and using Bayesian networks for identification decision making.
Saved in:
Published in | Vestnik SibADI (Online) no. 5(45); pp. 106 - 113 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | Russian |
Published |
Siberian State Automobile and Highway University
01.08.2017
|
Subjects | |
Online Access | Get full text |
ISSN | 2071-7296 2658-5626 |
DOI | 10.26518/2071-7296-2015-5(45)-106-113 |
Cover
Summary: | This article discusses the problem of Identity Theft Protection from unauthorized access in computer system. The method of user identification by features of user interacts with computer mouse based on a monitoring of subject activities and using Bayesian networks for identification decision making. |
---|---|
ISSN: | 2071-7296 2658-5626 |
DOI: | 10.26518/2071-7296-2015-5(45)-106-113 |