{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:14:18Z","timestamp":1777043658413,"version":"3.51.4"},"reference-count":24,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,7,19]],"date-time":"2021-07-19T00:00:00Z","timestamp":1626652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1016\/j.hcc.2021.100034","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T12:21:36Z","timestamp":1627388496000},"page":"100034","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":31,"title":["User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user"],"prefix":"10.1016","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0393-6448","authenticated-orcid":false,"given":"Rohit","family":"Ranjan","sequence":"first","affiliation":[]},{"given":"Shashi Shekhar","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2021.100034_bib0001","unstructured":"J. Potter, What is a lamp stack?, 2018. [Online]. Available: https:\/\/www.liquidweb.com\/kb\/what-is-a-lamp-stack\/"},{"key":"10.1016\/j.hcc.2021.100034_bib0002","unstructured":"Amazon Web Services, Online, AWS [Online]. Available: https:\/\/aws.amazon.com, 2006."},{"key":"10.1016\/j.hcc.2021.100034_bib0003","series-title":"The Twenty-Sixth International FLAIRS Conference","article-title":"User authentication from web browsing behavior","author":"Abramson","year":"2013"},{"key":"10.1016\/j.hcc.2021.100034_bib0004","series-title":"International Conference on Information Security","first-page":"99","article-title":"Implicit authentication through learning user behavior","author":"Shi","year":"2010"},{"key":"10.1016\/j.hcc.2021.100034_bib0005","series-title":"2010 International Conference on Security and Cryptography (SECRYPT)","first-page":"1","article-title":"Graphical authentication based on user behaviour","author":"Al-Khazzar","year":"2010"},{"issue":"1","key":"10.1016\/j.hcc.2021.100034_bib0006","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","article-title":"Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"8","author":"Frank","year":"2012","journal-title":"IEEE Trans. Inf. ForensicsSecur."},{"key":"10.1016\/j.hcc.2021.100034_bib0007","series-title":"Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security","first-page":"1","article-title":"User re-authentication via mouse movements","author":"Pusara","year":"2004"},{"issue":"4","key":"10.1016\/j.hcc.2021.100034_bib0008","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/581271.581272","article-title":"User authentication through keystroke dynamics","volume":"5","author":"Bergadano","year":"2002","journal-title":"ACM Trans. Inf. Syst. Secur.(TISSEC)"},{"key":"10.1016\/j.hcc.2021.100034_bib0009","series-title":"US Patent 9,185,095","article-title":"Behavioral Profiling Method and System to Authenticate a User","author":"Moritz","year":"2015"},{"issue":"4","key":"10.1016\/j.hcc.2021.100034_bib0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3191329","article-title":"A survey on malicious domains detection through DNS data analysis","volume":"51","author":"Zhauniarovich","year":"2018","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.hcc.2021.100034_bib0011","series-title":"2016 International Conference on Advanced Cloud and Big Data (CBD)","first-page":"207","article-title":"Secure model based on multi-cloud for big data storage and query","author":"Yang","year":"2016"},{"key":"10.1016\/j.hcc.2021.100034_bib0012","series-title":"2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)","first-page":"55","article-title":"Security and privacy requirements engineering revisited in the big data era","author":"Liu","year":"2016"},{"key":"10.1016\/j.hcc.2021.100034_bib0013","series-title":"2017 2nd International Conference on Anti-Cyber Crimes (ICACC)","first-page":"70","article-title":"Policy enforcement for big data security","author":"Al-Shomrani","year":"2017"},{"key":"10.1016\/j.hcc.2021.100034_bib0014","series-title":"2017 International Conference on Information and Communication Technology Convergence (ICTC)","first-page":"976","article-title":"Building a big data platform for large-scale security data analysis","author":"Lee","year":"2017"},{"key":"10.1016\/j.hcc.2021.100034_bib0015","series-title":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","first-page":"1262","article-title":"Real time threat detection system in cloud using big data analytics","author":"More","year":"2017"},{"key":"10.1016\/j.hcc.2021.100034_bib0016","series-title":"Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research","first-page":"34","article-title":"Game theory for cyber security","author":"Shiva","year":"2010"},{"key":"10.1016\/j.hcc.2021.100034_bib0017","series-title":"First International Conference on Sustainable Technologies for Computational Intelligence","first-page":"637","article-title":"Network intrusion detection system using random forest and decision tree machine learning techniques","author":"Bhavani","year":"2020"},{"key":"10.1016\/j.hcc.2021.100034_bib0018","unstructured":"I. Marathon Studios, Abuseipdb, 2019, [Online]. Available: https:\/\/www.abuseipdb.com"},{"key":"10.1016\/j.hcc.2021.100034_bib0019","unstructured":"community.rstudio.com, R studio crash course, 2019[Online]. Available: https:\/\/rstudio.com"},{"key":"10.1016\/j.hcc.2021.100034_bib0020","series-title":"ECML PKDD Workshop: Languages for Data Mining and Machine Learning","first-page":"108","article-title":"API design for machine learning software: experiences from the scikit-learn project","author":"Buitinck","year":"2013"},{"key":"10.1016\/j.hcc.2021.100034_bib0021","unstructured":"M. software, How to get the magento software, 2019[Online]. Available: https:\/\/devdocs.magento.com\/"},{"key":"10.1016\/j.hcc.2021.100034_bib0022","unstructured":"SciKit, Team scikit, 2019[Online]. Available: https:\/\/scikit-learn.org\/stable\/"},{"key":"10.1016\/j.hcc.2021.100034_bib0023","unstructured":"OWASP, Owasp top ten, 2017. [Online]. Available: https:\/\/owasp.org\/www-project-top-ten\/"},{"key":"10.1016\/j.hcc.2021.100034_bib0024","unstructured":"SANS, 2020 cwe top 25 most dangerous software weaknesses, 2020[Online]. Available: http:\/\/cwe.mitre.org\/top25\/archive\/2020\/2020."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295221000246?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295221000246?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:38:28Z","timestamp":1757407108000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295221000246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["S2667295221000246"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2021.100034","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2021.100034","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100034"}}