Attributes | Values |
---|
rdf:type
| |
Description
| - In this paper we present our methodology for context information processing, modeling users' behaviour and re-identification. Our primary interest is to what extent a user can be re-identified if we have his %22user profile%22 and how much information is required for a successful re-identification. We operate with ``user profiles'' that reflect user's behaviour in the past. We describe the input date we use for building behavioural characteristics; similarity searching procedure and an evaluation of the re-identification process. We discuss (and provide results of our experiments) how different initial conditions, as well as different approaches used in the similarity searching phase, influence the results and propose the optimal scenario where we obtain the most accurate results. We provide experimental results of re-identification of three protocols (SSH, HTTP and HTTPS).
- In this paper we present our methodology for context information processing, modeling users' behaviour and re-identification. Our primary interest is to what extent a user can be re-identified if we have his %22user profile%22 and how much information is required for a successful re-identification. We operate with ``user profiles'' that reflect user's behaviour in the past. We describe the input date we use for building behavioural characteristics; similarity searching procedure and an evaluation of the re-identification process. We discuss (and provide results of our experiments) how different initial conditions, as well as different approaches used in the similarity searching phase, influence the results and propose the optimal scenario where we obtain the most accurate results. We provide experimental results of re-identification of three protocols (SSH, HTTP and HTTPS). (en)
|
Title
| - User profiling and re-identification: Case of university-wide network analysis
- User profiling and re-identification: Case of university-wide network analysis (en)
|
skos:prefLabel
| - User profiling and re-identification: Case of university-wide network analysis
- User profiling and re-identification: Case of university-wide network analysis (en)
|
skos:notation
| - RIV/00216224:14330/09:00036503!RIV10-MSM-14330___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216224:14330/09:00036503
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - user profiling; network analysis; data mining; IDF; similarity searching; cosine similarity (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Matyáš, Václav
- Kumpošt, Marek
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
issn
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Springer, Lecture Notes in Computer Science (LNCS)
|
http://localhost/t...ganizacniJednotka
| |