Вестник СибАДИ (Aug 2017)
The assesment of the identification capabilities of features of the user interacts with a computer mouth
Abstract
This article discusses the problem of Identity Theft Protection from unauthorized access in computer system. The method of user identification by features of user interacts with computer mouse based on a monitoring of subject activities and using Bayesian networks for identification decision making.
Keywords