dc.contributor.author | Mazhelis, Oleksiy | |
dc.date.accessioned | 2022-03-21T11:02:52Z | |
dc.date.available | 2022-03-21T11:02:52Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Mazhelis, O. (2006). One-Class Classifiers : A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection. <i>South African Computer Journal</i>, <i>6</i>(36), 29-48. <a href="https://doi.org/10.46298/arima.1877" target="_blank">https://doi.org/10.46298/arima.1877</a> | |
dc.identifier.other | CONVID_16699300 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/80270 | |
dc.description.abstract | One-class classifiers employing for training only the data from one class are justified when the data from other classes is difficult to obtain. In particular, their use is justified in mobile-masquerader detection, where user characteristics are classified as belonging to the legitimate user class or to the impostor class, and where collecting the data originated from impostors is problematic. This paper systematically reviews various one-class classification methods, and analyses their suitability in the context of mobile-masquerader detection. For each classification method, its sensitivity to the errors in the training set, computational requirements, and other characteristics are considered. After that, for each category of features used in masquerader detection, suitable classifiers are identified. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Computer Society of South Africa | |
dc.relation.ispartofseries | South African Computer Journal | |
dc.rights | CC BY 4.0 | |
dc.subject.other | One-class Classifiers | |
dc.subject.other | Mobile Terminal Security | |
dc.subject.other | Masquerader Detection | |
dc.subject.other | Computer Science | |
dc.subject.other | Mathematics | |
dc.title | One-Class Classifiers : A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202203211968 | |
dc.contributor.laitos | Tietojenkäsittelytieteiden laitos | fi |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Department of Computer Science and Information Systems | en |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 29-48 | |
dc.relation.issn | 1015-7999 | |
dc.relation.numberinseries | 36 | |
dc.relation.volume | 6 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Author, 2006 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.format.content | fulltext | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.46298/arima.1877 | |
dc.type.okm | A1 | |