User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment
暂无分享,去创建一个
Peng Li | Ruchuan Wang | He Xu | Cheng Yang | Ting Fung Lau
[1] Yongfeng Huang,et al. Efficient association rule mining algorithm based on user behavior for cloud security auditing , 2016, 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS).
[2] Tian Junfeng,et al. A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs , 2014 .
[3] Anis Ahmed-Nacer,et al. Strong authentication for mobile cloud computing , 2016, 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE).
[4] Yuh-Jye Lee,et al. Frequent Pattern Based User Behavior Anomaly Detection for Cloud System , 2013, 2013 Conference on Technologies and Applications of Artificial Intelligence.
[5] Chuang Lin,et al. Privacy Petri Net and Privacy Leak Software , 2015, Journal of Computer Science and Technology.
[6] Tian Li-qin,et al. Modeling and Performance Analysis of User Behavior Authentication Using Stochastic Petri Nets , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.
[7] Aida Shojaee,et al. A new method for evaluating cloud computing user behavior trust , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).
[8] Athanasios V. Vasilakos,et al. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..
[9] Yang Yang. Modeling and Analysis of Dynamic User Behavior Authentication Scheme in Cloud Computing , 2011 .
[10] Graça Bressan,et al. A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.
[11] Xin Lu,et al. An user behavior credibility authentication model in cloud computing environment , 2014, Proceedings of 2nd International Conference on Information Technology and Electronic Commerce.
[12] Karan Saxena,et al. Hindrances in the security of Cloud Computing , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).
[13] T. Senthil Kumar,et al. Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics , 2014, FCC.
[14] Wei Dai,et al. A Study on Analysis Engine for Large-scale User Behavior based on Cloud Computing , 2014, MUE 2014.
[15] Galoh Rashidah Haron,et al. Adaptive authentication based on analysis of user behavior , 2014, 2014 Science and Information Conference.
[16] Jie Fang. Mining Analysis on User Search Behavior Based on Hadoop , 2016 .
[17] Li Jun-Jian,et al. User's Behavior Trust Evaluate Algorithm Based on Cloud Model , 2015, 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC).
[18] Haitao Tang,et al. User Identity Authentication Based on the Combination of Mouse and Keyboard Behavior , 2016 .