메뉴 건너뛰기




Volumn , Issue , 2007, Pages 837-842

Human computer interaction based intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRICS; INTRUSION DETECTION; ONLINE SYSTEMS; VERIFICATION;

EID: 34548127995     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2007.101     Document Type: Conference Paper
Times cited : (25)

References (51)
  • 3
    • 35248886709 scopus 로고    scopus 로고
    • S. Al-Zubi, A. Brömme and K. Tönnies, Using an Active Shape Structural Model for Biometric Sketch Recognition, In Proceedings of DAGM, Magdeburg, Germany, 10.-12. September 2003, pp. 187-195.
    • S. Al-Zubi, A. Brömme and K. Tönnies, Using an Active Shape Structural Model for Biometric Sketch Recognition, In Proceedings of DAGM, Magdeburg, Germany, 10.-12. September 2003, pp. 187-195.
  • 4
    • 3943082567 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses, Technical report
    • F. Apap, A. Honig, S. Hershkop, E. Eskin and S. Stolfo, Detecting malicious software by monitoring anomalous windows registry accesses, Technical report, CUCS Technical Report, 2001.
    • (2001) CUCS Technical Report
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 8
    • 34548111299 scopus 로고    scopus 로고
    • Caslon-Analytics, Available at: http://www.caslon.com.au /biometricsnote6.htm, Retrieved October 2,2005.
    • Caslon-Analytics, Available at: http://www.caslon.com.au /biometricsnote6.htm, Retrieved October 2,2005.
  • 17
    • 34548122028 scopus 로고    scopus 로고
    • User Profiling for Intrusion Detection in Windows NT
    • T. Goldring, User Profiling for Intrusion Detection in Windows NT, Computing Science and Statistics, 35 (2003).
    • (2003) Computing Science and Statistics , vol.35
    • Goldring, T.1
  • 22
    • 34147151570 scopus 로고    scopus 로고
    • Available at:, Retrieved July 12, 2006
    • J. Ilonen, Keystroke dynamics, Available at: www.it.lut.fi/ kurssit/03-04/010970000/seminars/Ilonen.pdf, Retrieved July 12, 2006.
    • Keystroke dynamics
    • Ilonen, J.1
  • 27
    • 78651566234 scopus 로고    scopus 로고
    • An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology
    • MLI 03-2, George Mason University, Fairfax, VA, June
    • K. Kaufman, G. Cervone and R. S. Michalski, An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology, Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA, June, 2003.
    • (2003) Reports of the Machine Learning and Inference Laboratory
    • Kaufman, K.1    Cervone, G.2    Michalski, R.S.3
  • 30
    • 34548109601 scopus 로고    scopus 로고
    • Detecting the Abnormal: Machine Learning in Computer Security, Department of Electrical and Computer Engineering
    • ECE-97-1, West Lafayette, January
    • T. Lane and C. E. Brodley, Detecting the Abnormal: Machine Learning in Computer Security, Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
    • (1997) Purdue University Technical Report
    • Lane, T.1    Brodley, C.E.2
  • 36
    • 34548114499 scopus 로고    scopus 로고
    • Storage-based intrusion detection: Watching storage activity for suspicious behavior
    • Technical report CMU-CS-02-179. Carnegie Mellon University, October
    • A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson and G. R. Ganger, Storage-based intrusion detection: Watching storage activity for suspicious behavior, Technical report CMU-CS-02-179. Carnegie Mellon University, October 2002.
    • (2002)
    • Pennington, A.G.1    Strunk, J.D.2    Griffin, J.L.3    Soules, C.A.N.4    Goodson, G.R.5    Ganger, G.R.6
  • 37
    • 34548122023 scopus 로고    scopus 로고
    • Stats and Analysis, Available at:, Retrieved June 7, 2006
    • Poker-edge.com, Stats and Analysis, Available at: http://www.poker-edge.com/stats.php, Retrieved June 7, 2006.
    • Poker-edge.com
  • 40
    • 34548109612 scopus 로고    scopus 로고
    • Quantifying the Quality of Web Authentication Mechanisms
    • Rinton Press, Available at
    • K. Renaud, Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, Journal of Web Engineering, Vol. 0, No. 0, Rinton Press, Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf, 2003.
    • (2003) A Usability Perspective, Journal of Web Engineering , vol.0 , Issue.0
    • Renaud, K.1
  • 44
    • 44349106280 scopus 로고    scopus 로고
    • Combining Behavior Models to Secure Email Systems
    • Available at:, April
    • S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang and O. Nimeskern, Combining Behavior Models to Secure Email Systems, CU Tech Report, Available at: wwwl.cs.columbia.edu/ids/publications/EMT-weijen.pdf, April 2003.
    • (2003) CU Tech Report
    • Stolfo, S.J.1    Hu, C.-W.2    Li, W.-J.3    Hershkop, S.4    Wang, K.5    Nimeskern, O.6
  • 46
    • 26444562687 scopus 로고    scopus 로고
    • The problem of concept drift: Definitions and related work
    • Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland
    • A. Tsymbal, The problem of concept drift: definitions and related work, Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland, 2004.
    • (2004)
    • Tsymbal, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.