메뉴 건너뛰기




Volumn , Issue , 2006, Pages 117-126

Evaluating the reliability of credential hardening through keystroke dynamics

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BIOMETRICS; CLASSIFICATION (OF INFORMATION); COMPUTER SYSTEMS; ERROR ANALYSIS; OPTIMIZATION;

EID: 34547659355     PISSN: 10719458     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSRE.2006.25     Document Type: Conference Paper
Times cited : (53)

References (22)
  • 1
    • 34547720104 scopus 로고    scopus 로고
    • Software package c5.0 / see5, 2004. http://www.rulequest.com/see5-info. html.
    • Software package c5.0 / see5, 2004. http://www.rulequest.com/see5-info. html.
  • 2
    • 34547711607 scopus 로고    scopus 로고
    • R random forests add-in, 2005. http://www.maths.lth.Se/help/R/.R/library/ randomForest/html/randomForest.html.
    • (2005) R random forests add-in
  • 3
    • 34547707743 scopus 로고    scopus 로고
    • Software package r
    • Software package r, 2005. http://www.r-project.org/.
    • (2005)
  • 4
    • 34547713916 scopus 로고    scopus 로고
    • Software package weka
    • Software package weka, 2005. http://www.cs.waikato.ac.nz/ml/weka/.
    • (2005)
  • 5
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 8
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman. Random forests. Machine Learning, 45(1):5-32, 2001.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 9
    • 0041382385 scopus 로고    scopus 로고
    • Random forests
    • Technical report, Department of Statistics, University of California at Berkeley, Berkeley, CA
    • L. Breiman and A. Cutler. Random forests. Technical report, Department of Statistics, University of California at Berkeley, Berkeley, CA, 1999.
    • (1999)
    • Breiman, L.1    Cutler, A.2
  • 10
    • 27544499407 scopus 로고    scopus 로고
    • Securing knowledge assets and processes: Lessons from the defense and intelligence sectors
    • K. C. Desouza and G. K. Vanapalli. Securing knowledge assets and processes: Lessons from the defense and intelligence sectors. In HICSS, 2005.
    • (2005) HICSS
    • Desouza, K.C.1    Vanapalli, G.K.2
  • 11
    • 34547711606 scopus 로고    scopus 로고
    • R. Gaines, W. Lisowksi, W. Press, and S. Shapiro. Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF, The Rand Corporation, Santa Monica, CA, 1980.
    • R. Gaines, W. Lisowksi, W. Press, and S. Shapiro. Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF, The Rand Corporation, Santa Monica, CA, 1980.
  • 12
    • 0039921280 scopus 로고    scopus 로고
    • Personal identification apparatus
    • Patent 4,621,334, U.S. Patent and Trademark Office, Washington, D.C, 1986
    • J. Garcia. Personal identification apparatus. Patent 4,621,334, U.S. Patent and Trademark Office, Washington, D.C., 1986.
    • Garcia, J.1
  • 14
    • 4243096135 scopus 로고    scopus 로고
    • The domino effect of password reuse
    • B. Ives, K. R. Walsh, and H. Schneider. The domino effect of password reuse. Commun. ACM, 47(4):75-78, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.4 , pp. 75-78
    • Ives, B.1    Walsh, K.R.2    Schneider, H.3
  • 15
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Feb
    • R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Communications of the ACM, 33(2), Feb 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.2
    • Joyce, R.1    Gupta, G.2
  • 16
    • 0038628620 scopus 로고    scopus 로고
    • Password hardening based on keystroke dynamics
    • F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. Int. J. Inf. Sec., 1(2):69-83, 2002.
    • (2002) Int. J. Inf. Sec , vol.1 , Issue.2 , pp. 69-83
    • Monrose, F.1    Reiter, M.K.2    Wetzel, S.3
  • 17
    • 0027580394 scopus 로고
    • An on-line neural network system for computer access security
    • Apr
    • M. S. Obaidat and D. T. Macchairolo. An on-line neural network system for computer access security. IEEE Trans. Industrial Electronics, 40(2):235-241, Apr 1993.
    • (1993) IEEE Trans. Industrial Electronics , vol.40 , Issue.2 , pp. 235-241
    • Obaidat, M.S.1    Macchairolo, D.T.2
  • 18
    • 0031121887 scopus 로고    scopus 로고
    • Verification of computer users using keystroke dynamics
    • Apr
    • M. S. Obaidat and B. Sadoun. Verification of computer users using keystroke dynamics. IEEE Trans. Systems, Man, and Cybernetics, 27(2):261-269, Apr 1997.
    • (1997) IEEE Trans. Systems, Man, and Cybernetics , vol.27 , Issue.2 , pp. 261-269
    • Obaidat, M.S.1    Sadoun, B.2
  • 22
    • 0041108230 scopus 로고    scopus 로고
    • Method and apparatus for verifying an individuals identity
    • Patent 4,805,222, U.S. Patent and Trademark Office, Washington, D.C, 1989
    • J. R. Young and R. W. Hammon. Method and apparatus for verifying an individuals identity. Patent 4,805,222, U.S. Patent and Trademark Office, Washington, D.C., 1989.
    • Young, J.R.1    Hammon, R.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.