{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:40:10Z","timestamp":1746348010937,"version":"3.40.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319113784"},{"type":"electronic","value":"9783319113791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11379-1_22","type":"book-chapter","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T03:14:54Z","timestamp":1408504494000},"page":"447-465","source":"Crossref","is-referenced-by-count":8,"title":["Towards a Masquerade Detection System Based on User\u2019s Tasks"],"prefix":"10.1007","author":[{"given":"J. Benito","family":"Cami\u00f1a","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Rodr\u00edguez","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"LNCS (LNAI)","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-25324-9_15","volume-title":"Advances in Artificial Intelligence","author":"B. Cami\u00f1a","year":"2011","unstructured":"Cami\u00f1a, B., Monroy, R., Trejo, L.A., S\u00e1nchez, E.: Towards building a masquerade detection method based on user file system navigation. In: Batyrshin, I., Sidorov, G. (eds.) MICAI 2011, Part I. LNCS (LNAI), vol.\u00a07094, pp. 174\u2013186. Springer, Heidelberg (2011)"},{"issue":"3","key":"22_CR2","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1016\/j.eswa.2013.08.022","volume":"41","author":"J.B. Cami\u00f1a","year":"2014","unstructured":"Cami\u00f1a, J.B., Hern\u00e1ndez-Gracidas, C., Monroy, R., Trejo, L.: The windows-users and -intruder simulations logs dataset (WUIL): An experimental framework for masquerade detection mechanisms. Expert Systems with Applications\u00a041(3), 919\u2013930 (2014)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science\u00a016(1), 58\u201374 (2001)","journal-title":"Statistical Science"},{"issue":"11","key":"22_CR4","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.1016\/j.jss.2012.06.014","volume":"85","author":"I. Razo-Zapata","year":"2012","unstructured":"Razo-Zapata, I., Mex-Perera, C., Monroy, R.: Masquerade attacks based on user\u2019s profile. Journal of Systems and Software\u00a085(11), 2640\u20132651 (2012)","journal-title":"Journal of Systems and Software"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC\/DMSEC 2004, pp. 1\u20138. ACM (October 2004)","DOI":"10.1145\/1029208.1029210"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-15512-3_14","volume-title":"Recent Advances in Intrusion Detection","author":"K. Killourhy","year":"2010","unstructured":"Killourhy, K., Maxion, R.: Why did my detector do that?! - predicting keystroke-dynamics error rates. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 256\u2013276. Springer, Heidelberg (2010)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, V., Pramanik, S., Upadhyaya, S.: Detecting masquerading users in a document management system. In: Proceedings of the IEEE International Conference on Communications, ICC 2006, vol.\u00a05, pp. 2296\u20132301. IEEE Computer Society Press (June 2006)","DOI":"10.1109\/ICC.2006.255112"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-23644-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"M.B. Salem","year":"2011","unstructured":"Salem, M.B., Stolfo, S.J.: Modeling user search behavior for masquerade detection. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 181\u2013200. Springer, Heidelberg (2011)"},{"key":"22_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1007\/11925231_59","volume-title":"MICAI 2006: Advances in Artificial Intelligence","author":"R. Posadas","year":"2006","unstructured":"Posadas, R., Mex-Perera, J.C., Monroy, R., Nolazco-Flores, J.A.: Hybrid method for detecting masqueraders using session folding and hidden Markov models. In: Gelbukh, A., Reyes-Garcia, C.A. (eds.) MICAI 2006. LNCS (LNAI), vol.\u00a04293, pp. 622\u2013631. Springer, Heidelberg (2006)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Garg, A., Rahalkar, R., Upadhyaya, S., Kwiat, K.: Profiling users in GUI based systems masquerade detection. In: 2006 IEEE Information Assurance Workshop, pp. 48\u201354. IEEE Computer Society Press (June 2006)","DOI":"10.1109\/IAW.2006.1652076"},{"key":"22_CR11","unstructured":"Weiss, A., Ramapanicker, A., Shah, P., Noble, S., Immohr, L.: Mouse movements biometric identification: A feasibility study. In: Student\/Faculty Research Day. CSIS, Pace University, pp. 1\u20138 (May 2007)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Messerman, A., Mustafic, T., Camtepe, S., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: Proceedings of the International Joint Conference on Biometrics, IJCB 2011, pp. 1\u20138. IEEE Computer Society Press (October 2011)","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Song, Y., Ben-Salem, M., Hershkop, S., Stolfo, S.: System level user behavior biometrics using fisher features and gaussian mixture models. In: Security and Privacy Workshops, SPW 2013, pp. 52\u201359. IEEE Computer Society Press (May 2013)","DOI":"10.1109\/SPW.2013.33"},{"issue":"2","key":"22_CR14","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"22_CR15","unstructured":"Schonlau, M.: Masquerading user data (Matthias Schonlau\u2019s home page) (1998), http:\/\/www.schonlau.net"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Maxion, R., Townsend, T.: Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, DSN 2002, vol.\u00a0600, pp. 219\u2013228. EEE Computer Society Press (June 2002)","DOI":"10.1109\/DSN.2002.1028903"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Maxion, R.: Masquerade detection using enriched command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, DSN 2003, vol.\u00a022, pp. 5\u201314. IEEE Computer Society Press (June 2003)","DOI":"10.1109\/DSN.2003.1209911"},{"key":"22_CR18","unstructured":"gGreenberg, S.: Using Unix: Collected traces of 168 users. Technical Report 88\/333\/45, Department of Computer Science, University of Calgary (1988)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Stolfo, S.J., Bellovin, S.M., Hershkop, S., Keromytis, A., Sinclair, S., Smith, S.W. (eds.) Insider Attack and Cyber Security: Beyond the Hacker. Advances in Information Security, pp. 69\u201390. Springer (2008)","DOI":"10.1007\/978-0-387-77322-3_5"},{"key":"22_CR20","unstructured":"Bertacchini, M., Fierens, P.: A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Inform\u00e1tica, CIBSI 2009. Universidad de la Rep\u00fablica de Uruguay, pp. 46\u201360 (November 2009)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Jha, S., Tan, K.M., Maxion, R.A.: Markov chains, classifiers, and intrusion detection. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, CSFW 2001, pp. 206\u2013219. IEEE Computer Society Press (June 2001)","DOI":"10.1109\/CSFW.2001.930147"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Killourhy, K., Maxion, R.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of the International Conference on Dependable Systems Networks, DSN 2009, pp. 125\u2013134. IEEE Computer Society Press (June 2009)","DOI":"10.1109\/DSN.2009.5270346"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11379-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:27:10Z","timestamp":1746347230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11379-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113784","9783319113791"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11379-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}