{"title":"Behavioral patterns in security applications","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/ICIIBMS.2017.8279716","DOIUrl":null,"url":null,"abstract":"In this paper will be presented possible applications of selected behavioral features for security purposes, and cryptography-based solutions. In particular several examples will be described, which present interesting applications of specific behavioral patterns, which may characterize participants of protocols. Personal behavioral patterns may be extracted using new generation cognitive information systems, and obtained features, may be applied in security solutions, or in cryptographic protocols.","PeriodicalId":122969,"journal":{"name":"2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIIBMS.2017.8279716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper will be presented possible applications of selected behavioral features for security purposes, and cryptography-based solutions. In particular several examples will be described, which present interesting applications of specific behavioral patterns, which may characterize participants of protocols. Personal behavioral patterns may be extracted using new generation cognitive information systems, and obtained features, may be applied in security solutions, or in cryptographic protocols.