메뉴 건너뛰기




Volumn 35, Issue 4, 2005, Pages 826-833

A parallel decision tree-based method for user authentication based on keystroke patterns

Author keywords

Biometrics; Computer security; Keystroke patterns; Monte Carlo methods; Network security; Parallel decision trees; Simulations; Wavelet analysis

Indexed keywords

COMPUTER SIMULATION; DECISION THEORY; LEARNING SYSTEMS; MONTE CARLO METHODS; SECURITY OF DATA; WAVELET TRANSFORMS;

EID: 24644438726     PISSN: 10834419     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCB.2005.846648     Document Type: Article
Times cited : (86)

References (18)
  • 1
    • 0025384135 scopus 로고
    • "Identity authentication based on keystroke latencies"
    • Feb.
    • R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
    • (1990) Commun. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 2
    • 0343700185 scopus 로고
    • "Authentication by Keystroke Timing: Some Preliminary Results"
    • Rand Corporation, Rand Report R-256-NSF
    • R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by Keystroke Timing: Some Preliminary Results," Rand Corporation, Rand Report R-256-NSF, 1980.
    • (1980)
    • Gaines, R.1    Lisowski, W.2    Press, S.3    Shapiro, N.4
  • 3
    • 0022129862 scopus 로고
    • "Identity verification through keyboard characteristics"
    • D. Umphress and G. Williams, "Identity verification through keyboard characteristics," Int. J. Man-Mach. Stud., vol. 23, no. 3, pp. 263-273, 1985.
    • (1985) Int. J. Man-Mach. Stud. , vol.23 , Issue.3 , pp. 263-273
    • Umphress, D.1    Williams, G.2
  • 4
    • 0023843707 scopus 로고
    • "Verifying identity via keystroke characteristics"
    • J. Leggett and G. Williams, "Verifying identity via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 28, no. 1, pp. 67-76, 1988.
    • (1988) Int. J. Man-Mach. Stud. , vol.28 , Issue.1 , pp. 67-76
    • Leggett, J.1    Williams, G.2
  • 5
    • 0041108231 scopus 로고
    • "Dynamic identity verification via keystroke characteristics"
    • G. Leggett, J. Williams, and M. Usnick, "Dynamic identity verification via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 35, no. 6, pp. 859-870, 1991.
    • (1991) Int. J. Man-Mach. Stud. , vol.35 , Issue.6 , pp. 859-870
    • Leggett, G.1    Williams, J.2    Usnick, M.3
  • 6
    • 0025541584 scopus 로고
    • "Computer-access security systems using keystroke dynamics"
    • Dec.
    • S. Bleha, C. Slivinsky, and B. Hussein, "Computer-access security systems using keystroke dynamics," IEEE Trans. Pattern Anal. Mach. Intell., vol. 12, no. 12, pp. 1217-1222, Dec. 1990.
    • (1990) IEEE Trans. Pattern Anal. Mach. Intell. , vol.12 , Issue.12 , pp. 1217-1222
    • Bleha, S.1    Slivinsky, C.2    Hussein, B.3
  • 7
    • 1642298729 scopus 로고    scopus 로고
    • "Best Practices in Testing and Reporting Performance of Biometric Devices"
    • NPL Rep. CMSC 14/02
    • A. J. Mansfield and J. L. Wayman, "Best Practices in Testing and Reporting Performance of Biometric Devices,", NPL Rep. CMSC 14/02, 2002.
    • (2002)
    • Mansfield, A.J.1    Wayman, J.L.2
  • 8
    • 27844577483 scopus 로고
    • "Personal Identification Apparatus"
    • J. Garcia, "Personal Identification Apparatus," U.S. Patent 4 621 334, 1986.
    • (1986) U.S. Patent 4 621 334
    • Garcia, J.1
  • 9
    • 0041108230 scopus 로고
    • "Method and Apparatus for Verifying an Individual's Identity"
    • J. R. Young and R. W. Hammon, "Method and Apparatus for Verifying an Individual's Identity," U.S. Patent 4 805 222, 1989.
    • (1989) U.S. Patent 4 805 222
    • Young, J.R.1    Hammon, R.W.2
  • 10
    • 0030675109 scopus 로고    scopus 로고
    • "Authentication via keystroke dynamics"
    • F. Monrose and A. Rubin, "Authentication via keystroke dynamics," in Proc. ACM Workshop, 1997, pp. 48-56.
    • (1997) Proc. ACM Workshop , pp. 48-56
    • Monrose, F.1    Rubin, A.2
  • 11
    • 38249026503 scopus 로고
    • "An application of fuzzy algorithms in a computer access security system"
    • B. Hussien, R. Mclaren, and S. Bleha, "An application of fuzzy algorithms in a computer access security system," Pattern Recognit. Lett., vol. 9, pp. 39-43, 1989.
    • (1989) Pattern Recognit. Lett. , vol.9 , pp. 39-43
    • Hussien, B.1    Mclaren, R.2    Bleha, S.3
  • 12
    • 0039921279 scopus 로고
    • "User identification via keystroke characteristics of typed names using neural networks"
    • M. Brown and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man-Mach. Stud., vol. 39, no. 6, pp. 999-1014, 1993.
    • (1993) Int. J. Man-Mach. Stud. , vol.39 , Issue.6 , pp. 999-1014
    • Brown, M.1    Rogers, S.J.2
  • 13
    • 0031121887 scopus 로고    scopus 로고
    • "Verification of computer users using keystroke dynamics"
    • Apr.
    • M. S. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans. Syst., Man, Cybern., pt. B, vol. 27, no. 2, pp. 261-269, Apr. 1997.
    • (1997) IEEE Trans. Syst., Man, Cybern. , vol.27 , Issue.2 PART B , pp. 261-269
    • Obaidat, M.S.1    Sadoun, B.2
  • 14
    • 0034290007 scopus 로고    scopus 로고
    • "Decision trees using apparent resistance to detect impending loss of synchronism"
    • Oct.
    • S. M. Rovnyak, C. W. Taylor, and Y. Sheng, "Decision trees using apparent resistance to detect impending loss of synchronism," IEEE Trans. Power Del., vol. 15, no. 4, pp. 1157-1162, Oct. 2000.
    • (2000) IEEE Trans. Power Del. , vol.15 , Issue.4 , pp. 1157-1162
    • Rovnyak, S.M.1    Taylor, C.W.2    Sheng, Y.3
  • 15
    • 27844537605 scopus 로고    scopus 로고
    • Salford Systems website. (Apr.). [Online] Available
    • Salford Systems website. (2004, Apr.). [Online] Available: http://www. salford-systems.com
    • (2004)
  • 16
    • 0005327658 scopus 로고    scopus 로고
    • "Web based keystroke dynamics identity verification using neural network: Over 200 sets of training data"
    • S. Cho, C. Han, D. H. Han, and H. I. Kim, "Web based keystroke dynamics identity verification using neural network: over 200 sets of training data," J. Organiz. Comput. Elect. Commerce, vol. 10, no. 4, pp. 295-307, 2000.
    • (2000) J. Organiz. Comput. Elect. Commerce , vol.10 , Issue.4 , pp. 295-307
    • Cho, S.1    Han, C.2    Han, D.H.3    Kim, H.I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.