Näytä suppeat kuvailutiedot

dc.contributor.authorMazhelis, Oleksiy
dc.date.accessioned2022-03-21T11:02:52Z
dc.date.available2022-03-21T11:02:52Z
dc.date.issued2006
dc.identifier.citationMazhelis, O. (2006). One-Class Classifiers : A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection. <i>South African Computer Journal</i>, <i>6</i>(36), 29-48. <a href="https://doi.org/10.46298/arima.1877" target="_blank">https://doi.org/10.46298/arima.1877</a>
dc.identifier.otherCONVID_16699300
dc.identifier.otherTUTKAID_24722
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/80270
dc.description.abstractOne-class classifiers employing for training only the data from one class are justified when the data from other classes is difficult to obtain. In particular, their use is justified in mobile-masquerader detection, where user characteristics are classified as belonging to the legitimate user class or to the impostor class, and where collecting the data originated from impostors is problematic. This paper systematically reviews various one-class classification methods, and analyses their suitability in the context of mobile-masquerader detection. For each classification method, its sensitivity to the errors in the training set, computational requirements, and other characteristics are considered. After that, for each category of features used in masquerader detection, suitable classifiers are identified.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherComputer Society of South Africa
dc.relation.ispartofseriesSouth African Computer Journal
dc.rightsCC BY 4.0
dc.subject.otherOne-class Classifiers
dc.subject.otherMobile Terminal Security
dc.subject.otherMasquerader Detection
dc.subject.otherComputer Science
dc.subject.otherMathematics
dc.titleOne-Class Classifiers : A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202203211968
dc.contributor.laitosTietojenkäsittelytieteiden laitosfi
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosDepartment of Computer Science and Information Systemsen
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange29-48
dc.relation.issn1015-7999
dc.relation.numberinseries36
dc.relation.volume6
dc.type.versionpublishedVersion
dc.rights.copyright© Author, 2006
dc.rights.accesslevelopenAccessfi
dc.format.contentfulltext
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.46298/arima.1877
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0