메뉴 건너뛰기




Volumn , Issue , 2004, Pages 1-8

User re-authentication via mouse movements

Author keywords

Anomaly detection; Mouse dynamics; User re authentication

Indexed keywords

ALGORITHMS; DATA ACQUISITION; FEATURE EXTRACTION; HIERARCHICAL SYSTEMS; INTERNET; MATHEMATICAL MODELS; MICE (COMPUTER PERIPHERALS); PROGRAM PROCESSORS; SIGNAL DETECTION; USER INTERFACES;

EID: 20444496997     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029208.1029210     Document Type: Conference Paper
Times cited : (236)

References (44)
  • 2
    • 0001907967 scopus 로고    scopus 로고
    • Support vector machines: Hype or hallelujah?
    • K. Bennett and C. Campbell. Support vector machines: Hype or hallelujah? SIGKDD Explorations, 2:1-13, 2000.
    • (2000) SIGKDD Explorations , vol.2 , pp. 1-13
    • Bennett, K.1    Campbell, C.2
  • 7
    • 0003893616 scopus 로고
    • Requirements and model for IDES - A real-time intrusion detection system
    • Computer Science Laboratory, SRI International, Menlo Park, CA
    • D. E. Denning and P. G. Neumann. "Requirements and model for IDES - A real-time intrusion detection system". Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1985.
    • (1985) Technical Report
    • Denning, D.E.1    Neumann, P.G.2
  • 11
    • 58149321460 scopus 로고
    • Boosting a weak learning algorithm by majority
    • Y. Freund. Boosting a Weak Learning Algorithm by Majority. Information and Computation, 121(2):256-285, 1995.
    • (1995) Information and Computation , vol.121 , Issue.2 , pp. 256-285
    • Freund, Y.1
  • 16
    • 0036505670 scopus 로고    scopus 로고
    • A comparison of methods for multi-class support vector machines
    • C. Hsu and C. Lin. "A comparison of methods for multi-class support vector machines". IEEE Transactions on Neural Networks, 13:415-425, 2002.
    • (2002) IEEE Transactions on Neural Networks , vol.13 , pp. 415-425
    • Hsu, C.1    Lin, C.2
  • 18
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras. "State transition analysis: A rule-based intrusion detection approach". Software Engineering, 21(3):181-199, 1995.
    • (1995) Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 21
  • 23
    • 0036095845 scopus 로고    scopus 로고
    • Enhancing profiles for anomaly detection using time granularities
    • Y. Li, N. Wu, S. Jajodia, and X. S. Wang. "Enhancing profiles for anomaly detection using time granularities". Journal of Computer Security, 10(2):137-157, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.2 , pp. 137-157
    • Li, Y.1    Wu, N.2    Jajodia, S.3    Wang, X.S.4
  • 24
    • 0003451777 scopus 로고
    • A real-time intrusion detection expert system IDES - Final report
    • SRI Computer Science Laboratory, SRI International, February
    • T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. G. Neumann, H. S. Javitz, A. Valdes, and T. D. Garvey. "A real-time intrusion detection expert system IDES - Final report". Technical Report SRI-CSL-92-05, SRI Computer Science Laboratory, SRI International, February 1992.
    • (1992) Technical Report , vol.SRI-CSL-92-05
    • Lunt, T.F.1    Tamaru, A.2    Gilham, F.3    Jagannathan, R.4    Neumann, P.G.5    Javitz, H.S.6    Valdes, A.7    Garvey, T.D.8
  • 25
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length N-grams
    • ACM Press
    • C. Marceau. "Characterizing the behavior of a program using multiple-length N-grams". In Proceedings of the 2000 Workshop on New Security Paradigms, pages 101-110. ACM Press, 2000.
    • (2000) Proceedings of the 2000 Workshop on New Security Paradigms , pp. 101-110
    • Marceau, C.1
  • 27
    • 84944239503 scopus 로고    scopus 로고
    • Using finite automata to mine execution data for intrusion detection: A preliminary report
    • C. Michael and A. Ghosh. "Using finite automata to mine execution data for intrusion detection: A preliminary report". Lecture Notes in Computer Science, 1907:66-80, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1907 , pp. 66-80
    • Michael, C.1    Ghosh, A.2
  • 33
    • 84880692052 scopus 로고    scopus 로고
    • A brief introduction to boosting
    • R. E. Schapire. A brief introduction to boosting. In IJCAI, pages 1401-1406, 1999.
    • (1999) IJCAI , pp. 1401-1406
    • Schapire, R.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.