Abstract: Today all users depend on the computer in their daily life, for simple tasks such as checking Our studies in this paper describe an approach for identifying an intruder by his/her behavior ...