{"title":"安全应用程序中的行为模式","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/ICIIBMS.2017.8279716","DOIUrl":null,"url":null,"abstract":"In this paper will be presented possible applications of selected behavioral features for security purposes, and cryptography-based solutions. In particular several examples will be described, which present interesting applications of specific behavioral patterns, which may characterize participants of protocols. Personal behavioral patterns may be extracted using new generation cognitive information systems, and obtained features, may be applied in security solutions, or in cryptographic protocols.","PeriodicalId":122969,"journal":{"name":"2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Behavioral patterns in security applications\",\"authors\":\"M. Ogiela, L. Ogiela\",\"doi\":\"10.1109/ICIIBMS.2017.8279716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper will be presented possible applications of selected behavioral features for security purposes, and cryptography-based solutions. In particular several examples will be described, which present interesting applications of specific behavioral patterns, which may characterize participants of protocols. Personal behavioral patterns may be extracted using new generation cognitive information systems, and obtained features, may be applied in security solutions, or in cryptographic protocols.\",\"PeriodicalId\":122969,\"journal\":{\"name\":\"2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIIBMS.2017.8279716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIIBMS.2017.8279716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper will be presented possible applications of selected behavioral features for security purposes, and cryptography-based solutions. In particular several examples will be described, which present interesting applications of specific behavioral patterns, which may characterize participants of protocols. Personal behavioral patterns may be extracted using new generation cognitive information systems, and obtained features, may be applied in security solutions, or in cryptographic protocols.