{"id":"https://openalex.org/W2085402400","doi":"https://doi.org/10.1109/pst.2014.6890944","title":"Identifying users with application-specific command streams","display_name":"Identifying users with application-specific command streams","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W2085402400","doi":"https://doi.org/10.1109/pst.2014.6890944","mag":"2085402400"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2014.6890944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033248805","display_name":"Ala'a El Masri","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alaa El Masri","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA","Department of Computer Science, George Mason University , Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Department of Computer Science, George Mason University , Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058156010","display_name":"Harry Wechsler","orcid":"https://orcid.org/0000-0002-5454-8819"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harry Wechsler","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA","Department of Computer Science, George Mason University , Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Department of Computer Science, George Mason University , Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073854019","display_name":"Peter Likarish","orcid":null},"institutions":[{"id":"https://openalex.org/I177880774","display_name":"Drew University","ror":"https://ror.org/04gds4h28","country_code":"US","type":"education","lineage":["https://openalex.org/I177880774"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Likarish","raw_affiliation_strings":["Department of Mathematics and Computer Science, Drew University, Madison, NJ, USA","[Department of Mathematics and Computer Science, Drew University, Madison, NJ, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Drew University, Madison, NJ, USA","institution_ids":["https://openalex.org/I177880774"]},{"raw_affiliation_string":"[Department of Mathematics and Computer Science, Drew University, Madison, NJ, USA]","institution_ids":["https://openalex.org/I177880774"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046066368","display_name":"Brent Byunghoon Kang","orcid":"https://orcid.org/0000-0001-8984-1006"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Brent ByungHoon Kang","raw_affiliation_strings":["Graduate School of Information Security, Korea Advanced Institute of Science and Technology, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea Advanced Institute of Science and Technology, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033248805"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":4.937,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.95254425,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"232","last_page":"238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8005974888801575},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.7534002065658569},{"id":"https://openalex.org/keywords/unix","display_name":"Unix","score":0.6232861876487732},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5985262393951416},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5829091668128967},{"id":"https://openalex.org/keywords/keystroke-dynamics","display_name":"Keystroke dynamics","score":0.581699013710022},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.556017279624939},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.5323743224143982},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.5297191143035889},{"id":"https://openalex.org/keywords/shell","display_name":"Shell (structure)","score":0.49163633584976196},{"id":"https://openalex.org/keywords/captcha","display_name":"CAPTCHA","score":0.45652690529823303},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.35994046926498413},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3110051155090332},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.26113712787628174},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.23526468873023987},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09900930523872375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8005974888801575},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.7534002065658569},{"id":"https://openalex.org/C112968700","wikidata":"https://www.wikidata.org/wiki/Q11368","display_name":"Unix","level":3,"score":0.6232861876487732},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5985262393951416},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5829091668128967},{"id":"https://openalex.org/C79540074","wikidata":"https://www.wikidata.org/wiki/Q3269465","display_name":"Keystroke dynamics","level":4,"score":0.581699013710022},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.556017279624939},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.5323743224143982},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.5297191143035889},{"id":"https://openalex.org/C2781052500","wikidata":"https://www.wikidata.org/wiki/Q2230313","display_name":"Shell (structure)","level":2,"score":0.49163633584976196},{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.45652690529823303},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.35994046926498413},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3110051155090332},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.26113712787628174},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.23526468873023987},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09900930523872375},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2014.6890944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W58039618","https://openalex.org/W63951635","https://openalex.org/W104561821","https://openalex.org/W137396016","https://openalex.org/W1479806302","https://openalex.org/W1539877038","https://openalex.org/W1682084018","https://openalex.org/W1970057813","https://openalex.org/W1973704753","https://openalex.org/W2050183348","https://openalex.org/W2056470096","https://openalex.org/W2071136675","https://openalex.org/W2080964992","https://openalex.org/W2093197020","https://openalex.org/W2093488494","https://openalex.org/W2101497410","https://openalex.org/W2129841138","https://openalex.org/W2140177734","https://openalex.org/W2142638723","https://openalex.org/W2169112424","https://openalex.org/W6602615279","https://openalex.org/W6604301894","https://openalex.org/W6605682584","https://openalex.org/W6632273057","https://openalex.org/W6680581110"],"related_works":["https://openalex.org/W2155670618","https://openalex.org/W2052279280","https://openalex.org/W4211208539","https://openalex.org/W2159333170","https://openalex.org/W2031617473","https://openalex.org/W1573560902","https://openalex.org/W4224061638","https://openalex.org/W4244802227","https://openalex.org/W2906096565","https://openalex.org/W2888741745"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"and":[3,116,146,161,179],"describes":[4],"an":[5],"active":[6],"authentication":[7],"model":[8],"based":[9,58],"on":[10,59],"user":[11,27,103,121],"profiles":[12,57,88,138],"built":[13,141],"from":[14,26,125],"user-issued":[15],"commands":[16,29,145],"when":[17,63,94],"interacting":[18,64,95],"with":[19,37,65,96,127,181],"GUI-based":[20],"application.":[21],"Previous":[22],"behavioral":[23,61],"models":[24],"derived":[25],"issued":[28],"were":[30],"limited":[31],"to":[32,131],"analyzing":[33,73],"the":[34,38,52,74,84,105,109,112,164],"user's":[35,75],"interaction":[36,47],"*Nix":[39],"(Linux":[40],"or":[41,107],"Unix)":[42],"command":[43,122],"shell":[44],"program.":[45],"Human-computer":[46],"(HCI)":[48],"research":[49],"has":[50],"explored":[51,83],"idea":[53,85],"of":[54,86,120,158],"building":[55],"users":[56],"their":[60],"patterns":[62],"such":[66],"graphical":[67],"interfaces.":[68],"It":[69],"did":[70],"so":[71],"by":[72,89],"keystroke":[76],"and/or":[77],"mouse":[78,110],"dynamics.":[79],"However,":[80],"none":[81],"had":[82],"creating":[87],"capturing":[90],"users'":[91],"usage":[92],"characteristics":[93],"a":[97,102,118,134],"specific":[98],"application":[99],"beyond":[100],"how":[101],"strikes":[104],"keyboard":[106],"moves":[108],"across":[111],"screen.":[113],"We":[114],"obtain":[115],"utilize":[117],"dataset":[119],"streams":[123],"collected":[124],"working":[126],"Microsoft":[128],"(MS)":[129],"Word":[130,144],"serve":[132],"as":[133],"test":[135],"bed.":[136],"User":[137],"are":[139],"first":[140],"using":[142,150,175],"MS":[143],"identification":[147],"takes":[148],"place":[149],"machine":[151],"learning":[152],"algorithms.":[153],"Best":[154],"performance":[155],"in":[156],"terms":[157],"both":[159],"accuracy":[160],"Area":[162],"under":[163],"Curve":[165],"(AUC)":[166],"for":[167],"Receiver":[168],"Operating":[169],"Characteristic":[170],"(ROC)":[171],"curve":[172],"is":[173],"reported":[174],"Random":[176],"Forests":[177],"(RF)":[178],"AdaBoost":[180],"random":[182],"forests.":[183]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
