메뉴 건너뛰기




Volumn 26, Issue 4, 2007, Pages 300-310

Retraining a keystroke dynamics-based authenticator with impostor patterns

Author keywords

Biometrics; Keystroke dynamics based authentication; Learning vector quantization for novelty detection; Novelty detection; Retraining

Indexed keywords

DATA DESCRIPTION; SECURITY OF DATA; USER INTERFACES; VECTOR QUANTIZATION;

EID: 34249913467     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.11.006     Document Type: Article
Times cited : (42)

References (43)
  • 6
    • 0026121425 scopus 로고
    • Dimensionality reduction and feature extraction applications inidentifying computer users
    • Bleha S., and Obaidat M.S. Dimensionality reduction and feature extraction applications inidentifying computer users. IEEE Transactions on Systems, Man and Cybernetics 21 2 (1991) 452-456
    • (1991) IEEE Transactions on Systems, Man and Cybernetics , vol.21 , Issue.2 , pp. 452-456
    • Bleha, S.1    Obaidat, M.S.2
  • 8
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • Bradley A.P. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition 30 7 (1997) 1145-1159
    • (1997) Pattern Recognition , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.P.1
  • 9
    • 0039921279 scopus 로고
    • User identification via keystroke characteristics of typed names using neural networks
    • Brown M., and Rogers S.J. User identification via keystroke characteristics of typed names using neural networks. International Journal of Man-Machine Studies 39 6 (1993) 999-1014
    • (1993) International Journal of Man-Machine Studies , vol.39 , Issue.6 , pp. 999-1014
    • Brown, M.1    Rogers, S.J.2
  • 11
    • 0033362256 scopus 로고    scopus 로고
    • Coltell Ò, Badía JM, Torres G. Biometric identification system based on keyboard filtering. In: Proceedings of IEEE 33rd annual 1999 international Carnahan conference on security technology, Madrid, Spain; 1999. p. 203-9.
  • 12
    • 0031275601 scopus 로고    scopus 로고
    • Enhanced password authentication through fuzzy logic
    • De Ru W.G., and Eloff J.H.P. Enhanced password authentication through fuzzy logic. IEEE Expert 12 6 (1997) 38-45
    • (1997) IEEE Expert , vol.12 , Issue.6 , pp. 38-45
    • De Ru, W.G.1    Eloff, J.H.P.2
  • 13
    • 34249904634 scopus 로고    scopus 로고
    • Gaines RS, Lisowski W, Press SJ, Shapiro N. Authentication by keystroke timing: some preliminary results. Technical Report, Rand Report R-256-NSF, Rand Corporation; 1980.
  • 15
    • 0347656710 scopus 로고    scopus 로고
    • Understanding users' keystroke patterns for computer access security
    • Guven A., and Sogukpinar I. Understanding users' keystroke patterns for computer access security. Computers and Security 22 8 (2003) 695-706
    • (2003) Computers and Security , vol.22 , Issue.8 , pp. 695-706
    • Guven, A.1    Sogukpinar, I.2
  • 16
    • 0003987134 scopus 로고    scopus 로고
    • Jain A.K., Bolle R., and Pankanti S. (Eds), Kluwer, Massachusetts, USA
    • In: Jain A.K., Bolle R., and Pankanti S. (Eds). Biometrics: personal identification in networked society (1999), Kluwer, Massachusetts, USA
    • (1999) Biometrics: personal identification in networked society
  • 17
    • 0034825091 scopus 로고    scopus 로고
    • Supervised versus unsupervised binary-learning by feed-forward neural networks
    • Japkowicz N. Supervised versus unsupervised binary-learning by feed-forward neural networks. Machine Learning 42 1-2 (2001) 97-122
    • (2001) Machine Learning , vol.42 , Issue.1-2 , pp. 97-122
    • Japkowicz, N.1
  • 18
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Joyce R., and Gupta G.K. Identity authentication based on keystroke latencies. Communications of the ACM 33 2 (1990) 168-176
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.K.2
  • 19
    • 0026113980 scopus 로고
    • Non-linear principal component analysis using autoassociative neural networks
    • Kramer M.A. Non-linear principal component analysis using autoassociative neural networks. AIChE Journal 37 2 (1991) 233-243
    • (1991) AIChE Journal , vol.37 , Issue.2 , pp. 233-243
    • Kramer, M.A.1
  • 20
    • 33745815656 scopus 로고    scopus 로고
    • Application of LVQ to novelty detection using outlier training data
    • Lee H., and Cho S. Application of LVQ to novelty detection using outlier training data. Pattern Recognition Letters 27 13 (2006) 1572-1579
    • (2006) Pattern Recognition Letters , vol.27 , Issue.13 , pp. 1572-1579
    • Lee, H.1    Cho, S.2
  • 21
    • 0030721345 scopus 로고    scopus 로고
    • Lin D-T. Computer-access authentication with neural network based keystroke identity verification. In: Proceedings of international conference on neural networks. Texas, USA; 1997. p. 174-78.
  • 22
    • 0142063407 scopus 로고    scopus 로고
    • Novelty detection: a review - part 1: statistical approaches
    • Markou M., and Singh S. Novelty detection: a review - part 1: statistical approaches. Signal Processing 83 12 (2003) 2481-2497
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2481-2497
    • Markou, M.1    Singh, S.2
  • 23
    • 0142126712 scopus 로고    scopus 로고
    • Novelty detection: a review - part 2: neural network based approaches
    • Markou M., and Singh S. Novelty detection: a review - part 2: neural network based approaches. Signal Processing 83 12 (2003) 2499-2521
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2499-2521
    • Markou, M.1    Singh, S.2
  • 24
    • 8844281752 scopus 로고    scopus 로고
    • Novelty detection in learning systems
    • Marsland S. Novelty detection in learning systems. Neural Computing Surveys 3 (2003) 157-195
    • (2003) Neural Computing Surveys , vol.3 , pp. 157-195
    • Marsland, S.1
  • 26
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • Monrose F., and Rubin A.D. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16 4 (2000) 351-359
    • (2000) Future Generation Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 31
    • 0027701529 scopus 로고
    • A methodology for improving computer access security
    • Obaidat M.S. A methodology for improving computer access security. Computers and Security 12 7 (1993) 657-662
    • (1993) Computers and Security , vol.12 , Issue.7 , pp. 657-662
    • Obaidat, M.S.1
  • 33
    • 34249894699 scopus 로고    scopus 로고
    • Polemi D. Biometric techniques: review and evaluation of biometric techniques for identification and authentication, including an appraisal of the areas where they are most applicable. Technical report, Institute of Communication and Computer Systems, National Technical University of Athens, Athens, Greece; 1997. ftp://ftp.cordis.lu/pub/infosec/docs/biomet.doc.
  • 35
    • 0042002081 scopus 로고
    • Neural network user authentication
    • Rogers J. Neural network user authentication. AI Expert 10 6 (1995) 29-33
    • (1995) AI Expert , vol.10 , Issue.6 , pp. 29-33
    • Rogers, J.1
  • 37
    • 0002193814 scopus 로고
    • Biometrics futures
    • Sherman R.L. Biometrics futures. Computers and Security 11 2 (1992) 128-133
    • (1992) Computers and Security , vol.11 , Issue.2 , pp. 128-133
    • Sherman, R.L.1
  • 38
    • 0942266514 scopus 로고    scopus 로고
    • Support vector data description
    • Tax D.M.J., and Duin R.P.W. Support vector data description. Machine Learning 54 1 (2004) 45-66
    • (2004) Machine Learning , vol.54 , Issue.1 , pp. 45-66
    • Tax, D.M.J.1    Duin, R.P.W.2
  • 39
    • 34249892141 scopus 로고    scopus 로고
    • Tax DMJ. One-class classification. Ph.D. thesis, Delft, The Netherlands: Delft University of Technology; 2001.
  • 43
    • 3042852406 scopus 로고    scopus 로고
    • Keystroke dynamics identity verification - its problems and practical solutions
    • Yu E., and Cho S. Keystroke dynamics identity verification - its problems and practical solutions. Computers and Security 23 5 (2004) 428-440
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 428-440
    • Yu, E.1    Cho, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.