메뉴 건너뛰기




Volumn 4, Issue 3, 2007, Pages 165-179

A new biometrie technology based on mouse dynamics

Author keywords

Biometrics; Human computer interaction; Mouse dynamics; Network security; Security monitoring

Indexed keywords

DATA TRANSFER; HUMAN COMPUTER INTERACTION; MICE (COMPUTER PERIPHERALS); NETWORK ARCHITECTURE; NETWORK SECURITY; NEURAL NETWORKS;

EID: 34547965365     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2007.70207     Document Type: Article
Times cited : (301)

References (17)
  • 1
    • 34547965885 scopus 로고    scopus 로고
    • J.P. Anderson, Computer Security Threat Monitoring and Surveillance, technical report, J.P. Anderson, Fort Washington, Pa., Apr. 1980.
    • J.P. Anderson, "Computer Security Threat Monitoring and Surveillance," technical report, J.P. Anderson, Fort Washington, Pa., Apr. 1980.
  • 3
    • 0039921279 scopus 로고
    • User Identification via Keystroke Characteristics of Typed Names Using Neural Networks
    • M. Brown and S.J. Rogers, "User Identification via Keystroke Characteristics of Typed Names Using Neural Networks," Int'l J. Man-Machine Studies, vol. 39, pp. 999-1014, 1993.
    • (1993) Int'l J. Man-Machine Studies , vol.39 , pp. 999-1014
    • Brown, M.1    Rogers, S.J.2
  • 5
    • 0023294428 scopus 로고
    • An Intrusion Detection Model
    • Feb
    • D. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 6
    • 0025384135 scopus 로고
    • Identity Authentication Based on Keystroke Latencies
    • Feb
    • R. Joyce and G. Gupta, "Identity Authentication Based on Keystroke Latencies," Comm. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
    • (1990) Comm. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 8
    • 0036522407 scopus 로고    scopus 로고
    • D. Maio, D. Maltoni, R. Capelli, J.L. Wayman, and A.K. Jain, FVC2000: Fingerprint Verification Competition, IEEE Trans. Pattern Analysis and Machine Intelligence, 24, no. 3, pp. 402-412, Mar. 2002.
    • D. Maio, D. Maltoni, R. Capelli, J.L. Wayman, and A.K. Jain, "FVC2000: Fingerprint Verification Competition," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 3, pp. 402-412, Mar. 2002.
  • 9
    • 0033901151 scopus 로고    scopus 로고
    • The NIST 1999 Speaker Recognition Evaluation-An Overview
    • A. Martin and M. Przybocki, "The NIST 1999 Speaker Recognition Evaluation-An Overview," Digital Signal Processing, vol. 10, no. 1-3, pp. 1-18, 2000.
    • (2000) Digital Signal Processing , vol.10 , Issue.1-3 , pp. 1-18
    • Martin, A.1    Przybocki, M.2
  • 10
    • 3042781449 scopus 로고    scopus 로고
    • Toward Reliable User Authentication through Biometrics
    • May/June
    • V. Matyas Jr. and Z. Riha, "Toward Reliable User Authentication through Biometrics," IEEE Security and Privacy Magazine, vol. 1, no. 3, pp. 45-49, May/June 2003.
    • (2003) IEEE Security and Privacy Magazine , vol.1 , Issue.3 , pp. 45-49
    • Matyas Jr., V.1    Riha, Z.2
  • 11
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and Intrusion Detection
    • J. McHugh, "Intrusion and Intrusion Detection," Int'l J. Information Security, vol. 1, pp. 14-35, 2001.
    • (2001) Int'l J. Information Security , vol.1 , pp. 14-35
    • McHugh, J.1
  • 14
    • 10044293457 scopus 로고    scopus 로고
    • Comparing Passwords, Tokens, and Biometrics for User Authentication
    • Dec
    • L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003.
    • (2003) Proc. IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 17
    • 0030242026 scopus 로고    scopus 로고
    • Effects of Angle of Approach on Cursor Movement with a Mouse: Consideration of Fitts' Law
    • T.G. Whisenand and H. Emurian, "Effects of Angle of Approach on Cursor Movement with a Mouse: Consideration of Fitts' Law," Computer in Human Behavior, vol. 12, no. 3, pp. 481-495, 1996.
    • (1996) Computer in Human Behavior , vol.12 , Issue.3 , pp. 481-495
    • Whisenand, T.G.1    Emurian, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.