-
1
-
-
34547720104
-
-
Software package c5.0 / see5, 2004. http://www.rulequest.com/see5-info. html.
-
Software package c5.0 / see5, 2004. http://www.rulequest.com/see5-info. html.
-
-
-
-
2
-
-
34547711607
-
-
R random forests add-in, 2005. http://www.maths.lth.Se/help/R/.R/library/ randomForest/html/randomForest.html.
-
(2005)
R random forests add-in
-
-
-
3
-
-
34547707743
-
-
Software package r
-
Software package r, 2005. http://www.r-project.org/.
-
(2005)
-
-
-
4
-
-
34547713916
-
-
Software package weka
-
Software package weka, 2005. http://www.cs.waikato.ac.nz/ml/weka/.
-
(2005)
-
-
-
5
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
8
-
-
0035478854
-
Random forests
-
L. Breiman. Random forests. Machine Learning, 45(1):5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
9
-
-
0041382385
-
Random forests
-
Technical report, Department of Statistics, University of California at Berkeley, Berkeley, CA
-
L. Breiman and A. Cutler. Random forests. Technical report, Department of Statistics, University of California at Berkeley, Berkeley, CA, 1999.
-
(1999)
-
-
Breiman, L.1
Cutler, A.2
-
10
-
-
27544499407
-
Securing knowledge assets and processes: Lessons from the defense and intelligence sectors
-
K. C. Desouza and G. K. Vanapalli. Securing knowledge assets and processes: Lessons from the defense and intelligence sectors. In HICSS, 2005.
-
(2005)
HICSS
-
-
Desouza, K.C.1
Vanapalli, G.K.2
-
11
-
-
34547711606
-
-
R. Gaines, W. Lisowksi, W. Press, and S. Shapiro. Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF, The Rand Corporation, Santa Monica, CA, 1980.
-
R. Gaines, W. Lisowksi, W. Press, and S. Shapiro. Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF, The Rand Corporation, Santa Monica, CA, 1980.
-
-
-
-
12
-
-
0039921280
-
Personal identification apparatus
-
Patent 4,621,334, U.S. Patent and Trademark Office, Washington, D.C, 1986
-
J. Garcia. Personal identification apparatus. Patent 4,621,334, U.S. Patent and Trademark Office, Washington, D.C., 1986.
-
-
-
Garcia, J.1
-
14
-
-
4243096135
-
The domino effect of password reuse
-
B. Ives, K. R. Walsh, and H. Schneider. The domino effect of password reuse. Commun. ACM, 47(4):75-78, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
15
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Feb
-
R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Communications of the ACM, 33(2), Feb 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
-
-
Joyce, R.1
Gupta, G.2
-
16
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. Int. J. Inf. Sec., 1(2):69-83, 2002.
-
(2002)
Int. J. Inf. Sec
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
17
-
-
0027580394
-
An on-line neural network system for computer access security
-
Apr
-
M. S. Obaidat and D. T. Macchairolo. An on-line neural network system for computer access security. IEEE Trans. Industrial Electronics, 40(2):235-241, Apr 1993.
-
(1993)
IEEE Trans. Industrial Electronics
, vol.40
, Issue.2
, pp. 235-241
-
-
Obaidat, M.S.1
Macchairolo, D.T.2
-
18
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
Apr
-
M. S. Obaidat and B. Sadoun. Verification of computer users using keystroke dynamics. IEEE Trans. Systems, Man, and Cybernetics, 27(2):261-269, Apr 1997.
-
(1997)
IEEE Trans. Systems, Man, and Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
19
-
-
0003851399
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA, 1993.
-
(1993)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
22
-
-
0041108230
-
Method and apparatus for verifying an individuals identity
-
Patent 4,805,222, U.S. Patent and Trademark Office, Washington, D.C, 1989
-
J. R. Young and R. W. Hammon. Method and apparatus for verifying an individuals identity. Patent 4,805,222, U.S. Patent and Trademark Office, Washington, D.C., 1989.
-
-
-
Young, J.R.1
Hammon, R.W.2
|