-
1
-
-
13244284703
-
User authentication through typing biometrics features
-
Araújo L.C.F., Sucupira Jr. L.H.R., Lizárraga M.G., Ling L.L., and Yabu-Uti J.B.T. User authentication through typing biometrics features. IEEE Transactions on Signal Processing 53 2 (2005) 851-855
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araújo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizárraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
6
-
-
0026121425
-
Dimensionality reduction and feature extraction applications inidentifying computer users
-
Bleha S., and Obaidat M.S. Dimensionality reduction and feature extraction applications inidentifying computer users. IEEE Transactions on Systems, Man and Cybernetics 21 2 (1991) 452-456
-
(1991)
IEEE Transactions on Systems, Man and Cybernetics
, vol.21
, Issue.2
, pp. 452-456
-
-
Bleha, S.1
Obaidat, M.S.2
-
8
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Bradley A.P. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition 30 7 (1997) 1145-1159
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
9
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
Brown M., and Rogers S.J. User identification via keystroke characteristics of typed names using neural networks. International Journal of Man-Machine Studies 39 6 (1993) 999-1014
-
(1993)
International Journal of Man-Machine Studies
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
10
-
-
0005327658
-
Web based keystroke dynamics identity verification using neural networks
-
Cho S., Han C., Han D., and Kim H.-I. Web based keystroke dynamics identity verification using neural networks. Journal of Organizational Computing and Electronic Commerce 10 4 (2000) 295-307
-
(2000)
Journal of Organizational Computing and Electronic Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.3
Kim, H.-I.4
-
11
-
-
0033362256
-
-
Coltell Ò, Badía JM, Torres G. Biometric identification system based on keyboard filtering. In: Proceedings of IEEE 33rd annual 1999 international Carnahan conference on security technology, Madrid, Spain; 1999. p. 203-9.
-
-
-
-
12
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
De Ru W.G., and Eloff J.H.P. Enhanced password authentication through fuzzy logic. IEEE Expert 12 6 (1997) 38-45
-
(1997)
IEEE Expert
, vol.12
, Issue.6
, pp. 38-45
-
-
De Ru, W.G.1
Eloff, J.H.P.2
-
13
-
-
34249904634
-
-
Gaines RS, Lisowski W, Press SJ, Shapiro N. Authentication by keystroke timing: some preliminary results. Technical Report, Rand Report R-256-NSF, Rand Corporation; 1980.
-
-
-
-
15
-
-
0347656710
-
Understanding users' keystroke patterns for computer access security
-
Guven A., and Sogukpinar I. Understanding users' keystroke patterns for computer access security. Computers and Security 22 8 (2003) 695-706
-
(2003)
Computers and Security
, vol.22
, Issue.8
, pp. 695-706
-
-
Guven, A.1
Sogukpinar, I.2
-
16
-
-
0003987134
-
-
Jain A.K., Bolle R., and Pankanti S. (Eds), Kluwer, Massachusetts, USA
-
In: Jain A.K., Bolle R., and Pankanti S. (Eds). Biometrics: personal identification in networked society (1999), Kluwer, Massachusetts, USA
-
(1999)
Biometrics: personal identification in networked society
-
-
-
17
-
-
0034825091
-
Supervised versus unsupervised binary-learning by feed-forward neural networks
-
Japkowicz N. Supervised versus unsupervised binary-learning by feed-forward neural networks. Machine Learning 42 1-2 (2001) 97-122
-
(2001)
Machine Learning
, vol.42
, Issue.1-2
, pp. 97-122
-
-
Japkowicz, N.1
-
18
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Joyce R., and Gupta G.K. Identity authentication based on keystroke latencies. Communications of the ACM 33 2 (1990) 168-176
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.K.2
-
19
-
-
0026113980
-
Non-linear principal component analysis using autoassociative neural networks
-
Kramer M.A. Non-linear principal component analysis using autoassociative neural networks. AIChE Journal 37 2 (1991) 233-243
-
(1991)
AIChE Journal
, vol.37
, Issue.2
, pp. 233-243
-
-
Kramer, M.A.1
-
20
-
-
33745815656
-
Application of LVQ to novelty detection using outlier training data
-
Lee H., and Cho S. Application of LVQ to novelty detection using outlier training data. Pattern Recognition Letters 27 13 (2006) 1572-1579
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.13
, pp. 1572-1579
-
-
Lee, H.1
Cho, S.2
-
21
-
-
0030721345
-
-
Lin D-T. Computer-access authentication with neural network based keystroke identity verification. In: Proceedings of international conference on neural networks. Texas, USA; 1997. p. 174-78.
-
-
-
-
22
-
-
0142063407
-
Novelty detection: a review - part 1: statistical approaches
-
Markou M., and Singh S. Novelty detection: a review - part 1: statistical approaches. Signal Processing 83 12 (2003) 2481-2497
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2481-2497
-
-
Markou, M.1
Singh, S.2
-
23
-
-
0142126712
-
Novelty detection: a review - part 2: neural network based approaches
-
Markou M., and Singh S. Novelty detection: a review - part 2: neural network based approaches. Signal Processing 83 12 (2003) 2499-2521
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2499-2521
-
-
Markou, M.1
Singh, S.2
-
24
-
-
8844281752
-
Novelty detection in learning systems
-
Marsland S. Novelty detection in learning systems. Neural Computing Surveys 3 (2003) 157-195
-
(2003)
Neural Computing Surveys
, vol.3
, pp. 157-195
-
-
Marsland, S.1
-
26
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
Monrose F., and Rubin A.D. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16 4 (2000) 351-359
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
29
-
-
0028423041
-
A multilayer neural network system for computer access security
-
Obaidat M.S., and Macchairolo D.T. A multilayer neural network system for computer access security. IEEE Transactions on Systems, Man, and Cybernetics 24 5 (1994) 806-813
-
(1994)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.24
, Issue.5
, pp. 806-813
-
-
Obaidat, M.S.1
Macchairolo, D.T.2
-
30
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
Obaidat M.S., and Sadoun B. Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 27 2 (1997) 261-269
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
31
-
-
0027701529
-
A methodology for improving computer access security
-
Obaidat M.S. A methodology for improving computer access security. Computers and Security 12 7 (1993) 657-662
-
(1993)
Computers and Security
, vol.12
, Issue.7
, pp. 657-662
-
-
Obaidat, M.S.1
-
33
-
-
34249894699
-
-
Polemi D. Biometric techniques: review and evaluation of biometric techniques for identification and authentication, including an appraisal of the areas where they are most applicable. Technical report, Institute of Communication and Computer Systems, National Technical University of Athens, Athens, Greece; 1997. ftp://ftp.cordis.lu/pub/infosec/docs/biomet.doc.
-
-
-
-
34
-
-
0032021402
-
Computer user verification using login string keystroke dynamics
-
Robinson J.A., Liang V.M., Chambers J.A.M., and MacKenzie C.L. Computer user verification using login string keystroke dynamics. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 28 2 (1998) 236-241
-
(1998)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
MacKenzie, C.L.4
-
35
-
-
0042002081
-
Neural network user authentication
-
Rogers J. Neural network user authentication. AI Expert 10 6 (1995) 29-33
-
(1995)
AI Expert
, vol.10
, Issue.6
, pp. 29-33
-
-
Rogers, J.1
-
36
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf B., Platt J.C., Shawe-Taylor J., Smola A.J., and Williamson R.C. Estimating the support of a high-dimensional distribution. Neural Computation 13 7 (2001) 1443-1471
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
37
-
-
0002193814
-
Biometrics futures
-
Sherman R.L. Biometrics futures. Computers and Security 11 2 (1992) 128-133
-
(1992)
Computers and Security
, vol.11
, Issue.2
, pp. 128-133
-
-
Sherman, R.L.1
-
38
-
-
0942266514
-
Support vector data description
-
Tax D.M.J., and Duin R.P.W. Support vector data description. Machine Learning 54 1 (2004) 45-66
-
(2004)
Machine Learning
, vol.54
, Issue.1
, pp. 45-66
-
-
Tax, D.M.J.1
Duin, R.P.W.2
-
39
-
-
34249892141
-
-
Tax DMJ. One-class classification. Ph.D. thesis, Delft, The Netherlands: Delft University of Technology; 2001.
-
-
-
-
42
-
-
0035575323
-
Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm
-
Wong F.W.M.H., Supian A.S.M., and Ismail A.F. Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. Conference record of the 35th Asilomar conference on signals, systems and computers, California, USA vol. 2 (2001) 911-915
-
(2001)
Conference record of the 35th Asilomar conference on signals, systems and computers, California, USA
, vol.2
, pp. 911-915
-
-
Wong, F.W.M.H.1
Supian, A.S.M.2
Ismail, A.F.3
-
43
-
-
3042852406
-
Keystroke dynamics identity verification - its problems and practical solutions
-
Yu E., and Cho S. Keystroke dynamics identity verification - its problems and practical solutions. Computers and Security 23 5 (2004) 428-440
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 428-440
-
-
Yu, E.1
Cho, S.2
|