V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, A. Nosyk, Valentyn Lebediev
{"title":"计算机系统用户行为的数学模型","authors":"V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, A. Nosyk, Valentyn Lebediev","doi":"10.1109/PICST51311.2020.9467944","DOIUrl":null,"url":null,"abstract":"Various electronic keys (tokens, cards, etc.) are also quite common in the quality of identifiers. But it should be noted that in recent years, more and more widespread identification systems that use biometric characteristics of man in solving the problem of access to information systems. Therefore, the task of developing models of behavior of users of computer systems, which take into account both dynamic and static properties of the behavior of users, as well as their possible ones, is urgent. The paper presents a comprehensive approach to the analysis of user behavior in order to identify anomalies in its work. This approach should take into account the dynamic and statistical properties of the behavior, as well as possible changes in behavior that are not associated with anomalies.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Mathematical Model of User Behavior in Computer Systems\",\"authors\":\"V. Martovytskyi, Igor Ruban, Oleksandr Sievierinov, A. Nosyk, Valentyn Lebediev\",\"doi\":\"10.1109/PICST51311.2020.9467944\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various electronic keys (tokens, cards, etc.) are also quite common in the quality of identifiers. But it should be noted that in recent years, more and more widespread identification systems that use biometric characteristics of man in solving the problem of access to information systems. Therefore, the task of developing models of behavior of users of computer systems, which take into account both dynamic and static properties of the behavior of users, as well as their possible ones, is urgent. The paper presents a comprehensive approach to the analysis of user behavior in order to identify anomalies in its work. This approach should take into account the dynamic and statistical properties of the behavior, as well as possible changes in behavior that are not associated with anomalies.\",\"PeriodicalId\":123008,\"journal\":{\"name\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST51311.2020.9467944\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST51311.2020.9467944","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mathematical Model of User Behavior in Computer Systems
Various electronic keys (tokens, cards, etc.) are also quite common in the quality of identifiers. But it should be noted that in recent years, more and more widespread identification systems that use biometric characteristics of man in solving the problem of access to information systems. Therefore, the task of developing models of behavior of users of computer systems, which take into account both dynamic and static properties of the behavior of users, as well as their possible ones, is urgent. The paper presents a comprehensive approach to the analysis of user behavior in order to identify anomalies in its work. This approach should take into account the dynamic and statistical properties of the behavior, as well as possible changes in behavior that are not associated with anomalies.