-
1
-
-
34547965885
-
-
J.P. Anderson, Computer Security Threat Monitoring and Surveillance, technical report, J.P. Anderson, Fort Washington, Pa., Apr. 1980.
-
J.P. Anderson, "Computer Security Threat Monitoring and Surveillance," technical report, J.P. Anderson, Fort Washington, Pa., Apr. 1980.
-
-
-
-
2
-
-
78650165017
-
User Authentication through Keystroke Dynamics
-
Nov
-
F. Bergadano, D. Guneti, and C. Picardi, "User Authentication through Keystroke Dynamics," ACM Trans. Information and System Security, vol. 5, no. 4, pp. 367-397, Nov. 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Guneti, D.2
Picardi, C.3
-
3
-
-
0039921279
-
User Identification via Keystroke Characteristics of Typed Names Using Neural Networks
-
M. Brown and S.J. Rogers, "User Identification via Keystroke Characteristics of Typed Names Using Neural Networks," Int'l J. Man-Machine Studies, vol. 39, pp. 999-1014, 1993.
-
(1993)
Int'l J. Man-Machine Studies
, vol.39
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
5
-
-
0023294428
-
An Intrusion Detection Model
-
Feb
-
D. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
6
-
-
0025384135
-
Identity Authentication Based on Keystroke Latencies
-
Feb
-
R. Joyce and G. Gupta, "Identity Authentication Based on Keystroke Latencies," Comm. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
-
(1990)
Comm. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
7
-
-
77958092470
-
Users Authentication by a Study of Human Computer Interactions
-
S. Hocquet, J.Y. Ramel, and H. Cardot, "Users Authentication by a Study of Human Computer Interactions," Proc. Eighth Ann. (Doctoral) Meeting on Health, Science and Technology, http:// www.univ-tours.fr/ed/ edsst/comm2004/hocquet.pdf, 2004.
-
(2004)
Proc. Eighth Ann. (Doctoral) Meeting on Health, Science and Technology
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
8
-
-
0036522407
-
-
D. Maio, D. Maltoni, R. Capelli, J.L. Wayman, and A.K. Jain, FVC2000: Fingerprint Verification Competition, IEEE Trans. Pattern Analysis and Machine Intelligence, 24, no. 3, pp. 402-412, Mar. 2002.
-
D. Maio, D. Maltoni, R. Capelli, J.L. Wayman, and A.K. Jain, "FVC2000: Fingerprint Verification Competition," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 3, pp. 402-412, Mar. 2002.
-
-
-
-
9
-
-
0033901151
-
The NIST 1999 Speaker Recognition Evaluation-An Overview
-
A. Martin and M. Przybocki, "The NIST 1999 Speaker Recognition Evaluation-An Overview," Digital Signal Processing, vol. 10, no. 1-3, pp. 1-18, 2000.
-
(2000)
Digital Signal Processing
, vol.10
, Issue.1-3
, pp. 1-18
-
-
Martin, A.1
Przybocki, M.2
-
10
-
-
3042781449
-
Toward Reliable User Authentication through Biometrics
-
May/June
-
V. Matyas Jr. and Z. Riha, "Toward Reliable User Authentication through Biometrics," IEEE Security and Privacy Magazine, vol. 1, no. 3, pp. 45-49, May/June 2003.
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.3
, pp. 45-49
-
-
Matyas Jr., V.1
Riha, Z.2
-
11
-
-
0012127229
-
Intrusion and Intrusion Detection
-
J. McHugh, "Intrusion and Intrusion Detection," Int'l J. Information Security, vol. 1, pp. 14-35, 2001.
-
(2001)
Int'l J. Information Security
, vol.1
, pp. 14-35
-
-
McHugh, J.1
-
13
-
-
34547965142
-
Time Prediction of MouseBased Cursor Movements
-
Sept
-
P. Oel, P. Schmidt, and A. Shmitt, "Time Prediction of MouseBased Cursor Movements," Proc. Joint AFIHM-BCS Conf. HumanComputer Interaction (IHM-HCI '01), vol. 2, pp. 37-40, Sept. 2001.
-
(2001)
Proc. Joint AFIHM-BCS Conf. HumanComputer Interaction (IHM-HCI '01)
, vol.2
, pp. 37-40
-
-
Oel, P.1
Schmidt, P.2
Shmitt, A.3
-
14
-
-
10044293457
-
Comparing Passwords, Tokens, and Biometrics for User Authentication
-
Dec
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003.
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
17
-
-
0030242026
-
Effects of Angle of Approach on Cursor Movement with a Mouse: Consideration of Fitts' Law
-
T.G. Whisenand and H. Emurian, "Effects of Angle of Approach on Cursor Movement with a Mouse: Consideration of Fitts' Law," Computer in Human Behavior, vol. 12, no. 3, pp. 481-495, 1996.
-
(1996)
Computer in Human Behavior
, vol.12
, Issue.3
, pp. 481-495
-
-
Whisenand, T.G.1
Emurian, H.2
|