{"id":"https://openalex.org/W2615801325","doi":"https://doi.org/10.1145/3057039.3057051","title":"Compromised User Credentials Detection Using Temporal Features","display_name":"Compromised User Credentials Detection Using Temporal Features","publication_year":2017,"publication_date":"2017-02-18","ids":{"openalex":"https://openalex.org/W2615801325","doi":"https://doi.org/10.1145/3057039.3057051","mag":"2615801325"},"language":"en","primary_location":{"id":"doi:10.1145/3057039.3057051","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3057039.3057051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Computer and Automation Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036556607","display_name":"Adnan Amin","orcid":"https://orcid.org/0000-0002-0852-8833"},"institutions":[{"id":"https://openalex.org/I4210127363","display_name":"Institute of Management Sciences Peshawar","ror":"https://ror.org/02m8e1r74","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210127363"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Adnan Amin","raw_affiliation_strings":["Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan","institution_ids":["https://openalex.org/I4210127363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032370620","display_name":"Sajid Anwar","orcid":"https://orcid.org/0000-0003-3393-1656"},"institutions":[{"id":"https://openalex.org/I4210127363","display_name":"Institute of Management Sciences Peshawar","ror":"https://ror.org/02m8e1r74","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210127363"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sajid Anwar","raw_affiliation_strings":["Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan","institution_ids":["https://openalex.org/I4210127363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065504551","display_name":"Babar Shah","orcid":"https://orcid.org/0000-0002-5090-4695"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Babar Shah","raw_affiliation_strings":["College of Technological Innovation, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101832436","display_name":"Asad Masood Khattak","orcid":"https://orcid.org/0000-0001-6949-3577"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Asad Masood Khattak","raw_affiliation_strings":["College of Technological Innovation, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I91044093"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036556607"],"corresponding_institution_ids":["https://openalex.org/I4210127363"],"apc_list":null,"apc_paid":null,"fwci":0.182,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54918049,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"9","issue":null,"first_page":"104","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7392033338546753},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.38630664348602295}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7392033338546753},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.38630664348602295}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3057039.3057051","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3057039.3057051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Computer and Automation Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320325295","display_name":"Zayed University","ror":"https://ror.org/03snqfa66"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W91862604","https://openalex.org/W161506010","https://openalex.org/W788203002","https://openalex.org/W1483817343","https://openalex.org/W1510346750","https://openalex.org/W1545915796","https://openalex.org/W1717533658","https://openalex.org/W1965586806","https://openalex.org/W1966454457","https://openalex.org/W1980298600","https://openalex.org/W1982161962","https://openalex.org/W1982418571","https://openalex.org/W2002380285","https://openalex.org/W2026493302","https://openalex.org/W2037768235","https://openalex.org/W2047562908","https://openalex.org/W2049058890","https://openalex.org/W2059832420","https://openalex.org/W2095363061","https://openalex.org/W2106649514","https://openalex.org/W2120111750","https://openalex.org/W2122053769","https://openalex.org/W2154689418","https://openalex.org/W2155743899","https://openalex.org/W2167312400","https://openalex.org/W2218242280","https://openalex.org/W2397135192","https://openalex.org/W2502782036","https://openalex.org/W2523635132","https://openalex.org/W4211139099","https://openalex.org/W4242314057","https://openalex.org/W6727311480"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"This":[0],"study":[1,72],"exposes":[2],"a":[3,30,74,83,89,109,118,123],"serious":[4],"and":[5,56,98,104,128,146],"rapidly":[6],"growing":[7],"cyber":[8],"threat":[9],"of":[10,47,91,125],"compromised":[11,31,48,79],"legitimate":[12,49],"user":[13,50],"credentials":[14,33],"which":[15],"is":[16,52,62],"very":[17],"effective":[18],"for":[19,122,151],"cyber-criminals":[20],"to":[21,65,77,102],"gain":[22],"trusted":[23],"relationships":[24],"with":[25],"the":[26,40,45,68,130,152],"account":[27],"owners.":[28],"Such":[29],"user's":[32,144],"ultimately":[34],"result":[35],"in":[36,54,82,112],"damage":[37],"incurred":[38],"by":[39],"attacker":[41],"at":[42],"large-scale.":[43],"Moreover,":[44],"detection":[46],"activities":[51],"crucial":[53],"competitive":[55],"sensitive":[57,119],"organizations":[58],"because":[59],"wrong":[60],"data":[61,116],"more":[63],"difficult":[64],"clean":[66],"from":[67,117],"database.":[69,85],"The":[70,133],"proposed":[71,131],"presents":[73],"novel":[75],"approach":[76,87],"detect":[78,103,142],"users'":[80],"activity":[81,145],"live":[84],"Our":[86],"uses":[88],"composition":[90],"prudence":[92],"analysis,":[93],"ripple":[94],"down":[95],"rules":[96],"(RDR)":[97],"simulated":[99],"experts":[100],"(SE)":[101],"identify":[105],"accounts":[106],"that":[107,136],"experience":[108],"sudden":[110],"change":[111],"behavior.":[113],"We":[114],"collected":[115],"running":[120],"database":[121],"period":[124],"Six":[126],"months":[127],"evaluate":[129],"technique.":[132],"results":[134],"show":[135],"this":[137],"combined":[138],"model":[139],"can":[140,147],"fully":[141],"outlier":[143],"provide":[148],"useful":[149],"information":[150],"concerned":[153],"decision":[154],"maker.":[155]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
