메뉴 건너뛰기




Volumn , Issue , 2004, Pages 467-474

Applying hidden Markov models to keystroke pattern analysis for password verification

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DISTRIBUTION DENSITY; HIDDEN MARKOV MODELS (HMM); PATTERN ANALYSIS;

EID: 16244403658     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (18)
  • 1
    • 84936893490 scopus 로고
    • Vital signs of identity biometrics
    • Feb.
    • B. Miller, "Vital signs of identity biometrics," IEEE Spectrum, vol. 31, no. 2, pp. 22-30, Feb. 1994.
    • (1994) IEEE Spectrum , vol.31 , Issue.2 , pp. 22-30
    • Miller, B.1
  • 2
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Feb.
    • R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Communications of the ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 5
    • 0031121887 scopus 로고    scopus 로고
    • Verification of computer users using keystroke dynamics
    • M. S. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans, on System, Man, and Cybernetics, vol. 27, no. 2, pp. 261-269, 1997.
    • (1997) IEEE Trans, on System, Man, and Cybernetics , vol.27 , Issue.2 , pp. 261-269
    • Obaidat, M.S.1    Sadoun, B.2
  • 7
    • 0030721345 scopus 로고    scopus 로고
    • Computer-access authentication with neural network based keystroke identity verification
    • Jun.
    • D.-T. Lin, "Computer-access authentication with neural network based keystroke identity verification," in Proceedings of IEEE Int. Conf. on Neural Networks, vol. 1, pp. 174-178, Jun. 1997.
    • (1997) Proceedings of IEEE Int. Conf. on Neural Networks , vol.1 , pp. 174-178
    • Lin, D.-T.1
  • 8
    • 0033316258 scopus 로고    scopus 로고
    • A comparison of artificial neural networks and cluster analysis for typing biometrics authentication
    • Jul.
    • L. K. Maisuria, C. S. Ong, and W. K. Lai, "A comparison of artificial neural networks and cluster analysis for typing biometrics authentication," in Proceedings of IEEE Int. Joint Conf. on Neural Networks, vol. 5., pp. 3295-3299, Jul. 1999.
    • (1999) Proceedings of IEEE Int. Joint Conf. on Neural Networks , vol.5 , pp. 3295-3299
    • Maisuria, L.K.1    Ong, C.S.2    Lai, W.K.3
  • 9
    • 0141522840 scopus 로고    scopus 로고
    • GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
    • Jul.
    • E. Yu and S. Cho, "GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification," in Proceedings of IEEE Int. Joint Conf. on Neural Networks, vol. 3, pp. 2253-2257, Jul. 2003.
    • (2003) Proceedings of IEEE Int. Joint Conf. on Neural Networks , vol.3 , pp. 2253-2257
    • Yu, E.1    Cho, S.2
  • 10
    • 0022594196 scopus 로고
    • An introduction to hidden Markov models
    • L. R. Rabiner and B. H. Juang, "An introduction to hidden Markov models," IEEE ASSP Magazine, vol. 3, no. 1, pp. 4-16, 1986.
    • (1986) IEEE ASSP Magazine , vol.3 , Issue.1 , pp. 4-16
    • Rabiner, L.R.1    Juang, B.H.2
  • 11
    • 0022099671 scopus 로고
    • Some properties of continous hidden Markov model representations
    • Jul.-Aug.
    • L. R. Rabiner, B. H. Juang, S. E. Levinson, and M. M. Sondhi, "Some properties of continous hidden Markov model representations," AT&T Technical Journal., vol. 64, no. 6, pp. 1251-1270, Jul.-Aug. 1985.
    • (1985) AT&T Technical Journal , vol.64 , Issue.6 , pp. 1251-1270
    • Rabiner, L.R.1    Juang, B.H.2    Levinson, S.E.3    Sondhi, M.M.4
  • 12
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb.
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, Feb. 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2
    • Rabiner, L.R.1
  • 13
    • 0020734214 scopus 로고
    • An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition
    • Apr.
    • S. E. Levinson, L. R. Rabiner, M. M. Sondhi, "An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition," Bell Systems Technical Journal, vol. 62, no. 4, pp. 1035-1074, Apr. 1983.
    • (1983) Bell Systems Technical Journal , vol.62 , Issue.4 , pp. 1035-1074
    • Levinson, S.E.1    Rabiner, L.R.2    Sondhi, M.M.3
  • 14
    • 0022685753 scopus 로고
    • Continuously variable duration hidden Markov models for automatic speech recognition
    • Mar.
    • S. E. Levinson, "Continuously variable duration hidden Markov models for automatic speech recognition," Computer, Speech and Language, vol. 1, no. 1, pp. 29-45, Mar. 1986.
    • (1986) Computer, Speech and Language , vol.1 , Issue.1 , pp. 29-45
    • Levinson, S.E.1
  • 16
    • 0015600423 scopus 로고
    • The Viterbi algorithm
    • Mar.
    • G. D. Forney, "The Viterbi algorithm," Proceedings of the IEEE, vol. 61, pp. 268-278, Mar. 1973.
    • (1973) Proceedings of the IEEE , vol.61 , pp. 268-278
    • Forney, G.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.