Author of the publication

On User Interaction Behavior as Evidence for Computer Forensic Analysis.

, , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 221-231. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of the Consistency in Keystroke Dynamics., , and . CCBR, volume 8232 of Lecture Notes in Computer Science, page 409-416. Springer, (2013)An Improvement of Affine Iterative Closest Point Algorithm for Partial Registration., , , , and . ICIMCS, page 72-75. ACM, (2016)Multi-touch Authentication Using Hand Geometry and Behavioral Information., , and . IEEE Symposium on Security and Privacy, page 357-372. IEEE Computer Society, (2017)Gender recognition using motion data from multiple smart devices., , and . Expert Syst. Appl., (2020)Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems., and . IJDCF, 8 (2): 16-26 (2016)Estimating user behavior toward detecting anomalous ratings in rating systems., , and . Knowl.-Based Syst., (2016)Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs., , , , and . ICC, page 1990-1994. IEEE, (2013)Real-time volume control for interactive network traffic replay., , , and . Computer Networks, 57 (7): 1611-1629 (2013)Learning edge weights in file co-occurrence graphs for malware detection., , , and . Data Min. Knowl. Discov., 33 (1): 168-203 (2019)Web page and image semi-supervised classification with heterogeneous information fusion., , , and . J. Inf. Sci., 39 (3): 289-306 (2013)