-
1
-
-
34548111298
-
-
United States Military Academy, West Point, NY, June
-
A. A. E. Ahmed and I. Traore, Anomaly Intrusion Detection based on Biometrics, Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2005.
-
(2005)
Anomaly Intrusion Detection based on Biometrics, Workshop on Information Assurance
-
-
Ahmed, A.A.E.1
Traore, I.2
-
2
-
-
84883286001
-
-
St. Andrews, New Brunswick, Canada, October
-
A. A. E. Ahmed and I. Traore, Detecting Computer Intrusions Using Behavioral Biometrics, Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, October, 2005.
-
(2005)
Detecting Computer Intrusions Using Behavioral Biometrics, Third Annual Conference on Privacy, Security and Trust
-
-
Ahmed, A.A.E.1
Traore, I.2
-
3
-
-
35248886709
-
-
S. Al-Zubi, A. Brömme and K. Tönnies, Using an Active Shape Structural Model for Biometric Sketch Recognition, In Proceedings of DAGM, Magdeburg, Germany, 10.-12. September 2003, pp. 187-195.
-
S. Al-Zubi, A. Brömme and K. Tönnies, Using an Active Shape Structural Model for Biometric Sketch Recognition, In Proceedings of DAGM, Magdeburg, Germany, 10.-12. September 2003, pp. 187-195.
-
-
-
-
4
-
-
3943082567
-
Detecting malicious software by monitoring anomalous windows registry accesses, Technical report
-
F. Apap, A. Honig, S. Hershkop, E. Eskin and S. Stolfo, Detecting malicious software by monitoring anomalous windows registry accesses, Technical report, CUCS Technical Report, 2001.
-
(2001)
CUCS Technical Report
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
5
-
-
60749096615
-
-
G. Bartolacci, M. Curtin, M. Katzenberg, N. Nwana, S.-H. Cha and C. C. Tappert, Long-Text Keystroke Biometric Applications over the Internet, MLMTA, 2005, pp. 119-126.
-
(2005)
Long-Text Keystroke Biometric Applications over the Internet, MLMTA
, pp. 119-126
-
-
Bartolacci, G.1
Curtin, M.2
Katzenberg, M.3
Nwana, N.4
Cha, S.-H.5
Tappert, C.C.6
-
6
-
-
78650165017
-
-
November
-
F. Bergadano, D. Gunetti and C. Picardi, User authentication through keystroke dynamics, ACM Transactions on Information and System Security (TISSEC), November 2002, pp. 367-397.
-
(2002)
User authentication through keystroke dynamics, ACM Transactions on Information and System Security (TISSEC)
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
7
-
-
85135199625
-
-
Darmstadt, Germany, July
-
A. Brömme and S. Al-Zubi, Multifactor Biometric Sketch Authentication, In A. Brömme and C Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003, pp. 81-90.
-
(2003)
Multifactor Biometric Sketch Authentication, In A. Brömme and C Busch, editors, Proceedings of the BIOSIG 2003
, vol.24
, pp. 81-90
-
-
Brömme, A.1
Al-Zubi, S.2
-
8
-
-
34548111299
-
-
Caslon-Analytics, Available at: http://www.caslon.com.au /biometricsnote6.htm, Retrieved October 2,2005.
-
Caslon-Analytics, Available at: http://www.caslon.com.au /biometricsnote6.htm, Retrieved October 2,2005.
-
-
-
-
9
-
-
34548115884
-
-
Hong Kong, June
-
M. Curtin, C. C. Tappert, M. Villani, G. Ngo, J. Simone, H. S. Fort and S. Cha, Keystroke Biometric Recognition on LongText Input: A Feasibility Study, Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006), Hong Kong, June 2006.
-
(2006)
Keystroke Biometric Recognition on LongText Input: A Feasibility Study, Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006)
-
-
Curtin, M.1
Tappert, C.C.2
Villani, M.3
Ngo, G.4
Simone, J.5
Fort, H.S.6
Cha, S.7
-
12
-
-
0038825045
-
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee and W. Gong, Anomaly detection using call stack information, In Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 62-78.
-
(2003)
Anomaly detection using call stack information, In Proceedings of IEEE Symposium on Security and Privacy
, pp. 62-78
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
13
-
-
67649949220
-
-
Kluwer Academic Publishers, Set-bal Portugal, August
-
G. Frantzeskou, S. Gritzalis and S. MacDonell, Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process, 1st International Conference on eBusiness and Telecommunication Networks - Security and Reliability in Information Systems and Networks Track, Kluwer Academic Publishers, Set-bal Portugal, August 2004, pp. 85-92.
-
(2004)
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process, 1st International Conference on eBusiness and Telecommunication Networks - Security and Reliability in Information Systems and Networks Track
, pp. 85-92
-
-
Frantzeskou, G.1
Gritzalis, S.2
MacDonell, S.3
-
16
-
-
85042797742
-
-
April
-
A. K. Ghosh, A. Schwartzbard and M. Schatz, Learning program behavior proles for intrusion detection, In Proceedings of the First USENLX Workshop on Intrusion Detection and Network Monitoring, April 1999, pp. 51-62.
-
(1999)
Learning program behavior proles for intrusion detection, In Proceedings of the First USENLX Workshop on Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
17
-
-
34548122028
-
User Profiling for Intrusion Detection in Windows NT
-
T. Goldring, User Profiling for Intrusion Detection in Windows NT, Computing Science and Statistics, 35 (2003).
-
(2003)
Computing Science and Statistics
, vol.35
-
-
Goldring, T.1
-
18
-
-
34548115885
-
-
A. Gray, P. Sallis and S. MacDonell, Software Forensics: Extending Authorship Analysis Techniques to Computer Programs, In Proc. 3rd Biannual Conf. Int. Assoc, of Forensic Linguists (IAFL'97), 1997.
-
(1997)
Software Forensics: Extending Authorship Analysis Techniques to Computer Programs, In Proc. 3rd Biannual Conf. Int. Assoc, of Forensic Linguists (IAFL'97)
-
-
Gray, A.1
Sallis, P.2
MacDonell, S.3
-
19
-
-
33745198933
-
-
Springer-Verlag, Madrid, Spain
-
D. Gunetti, C. Picardi and G. Ruffo, Keystroke Analysis of Different Languages: a Case Study, Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Springer-Verlag, Madrid, Spain, 2005, pp. 133-144.
-
(2005)
Keystroke Analysis of Different Languages: A Case Study, Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005)
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
21
-
-
0029267472
-
-
K. Ilgun, R. A. Kemmerer and P. A. Porras, State transition analysis: A rule-based intrusion detection approach, Software Engineering, 1995, pp. 181-199.
-
(1995)
State transition analysis: A rule-based intrusion detection approach, Software Engineering
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
22
-
-
34147151570
-
-
Available at:, Retrieved July 12, 2006
-
J. Ilonen, Keystroke dynamics, Available at: www.it.lut.fi/ kurssit/03-04/010970000/seminars/Ilonen.pdf, Retrieved July 12, 2006.
-
Keystroke dynamics
-
-
Ilonen, J.1
-
24
-
-
0742290133
-
-
A. K. Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuits Syst. Video Technol, 2004, pp. 4-20.
-
(2004)
An introduction to biometric recognition, IEEE Trans. Circuits Syst. Video Technol
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
25
-
-
84867777345
-
-
A. R. Jansen, D. L. Dowe and G. E., Farr Inductive Inference of Chess Player Strategy, Proceedings of the 6th Pacific Rim International Conference on Artificial Intelligence (PRICAI'2000), 2000, pp. 61-71.
-
(2000)
Farr Inductive Inference of Chess Player Strategy, Proceedings of the 6th Pacific Rim International Conference on Artificial Intelligence (PRICAI'2000)
, pp. 61-71
-
-
Jansen, A.R.1
Dowe, D.L.2
E., G.3
-
26
-
-
85084161999
-
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter and A. D. Rubin, The Design and Analysis of Graphical Passwords, Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-36, 1999.
-
(1999)
The Design and Analysis of Graphical Passwords, Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-36
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
27
-
-
78651566234
-
An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology
-
MLI 03-2, George Mason University, Fairfax, VA, June
-
K. Kaufman, G. Cervone and R. S. Michalski, An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology, Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA, June, 2003.
-
(2003)
Reports of the Machine Learning and Inference Laboratory
-
-
Kaufman, K.1
Cervone, G.2
Michalski, R.S.3
-
30
-
-
34548109601
-
Detecting the Abnormal: Machine Learning in Computer Security, Department of Electrical and Computer Engineering
-
ECE-97-1, West Lafayette, January
-
T. Lane and C. E. Brodley, Detecting the Abnormal: Machine Learning in Computer Security, Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
-
(1997)
Purdue University Technical Report
-
-
Lane, T.1
Brodley, C.E.2
-
34
-
-
33845498470
-
-
Ottawa, Canada, 17-19 May
-
M. Orozco, Y. Asfaw, A. Adler, S. Shirmohammadi and A. E. Saddik, Automatic Identification of Participants in Haptic Systems, 2005 IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada, 17-19 May 2005.
-
(2005)
Automatic Identification of Participants in Haptic Systems, 2005 IEEE Instrumentation and Measurement Technology Conference
-
-
Orozco, M.1
Asfaw, Y.2
Adler, A.3
Shirmohammadi, S.4
Saddik, A.E.5
-
35
-
-
33750122385
-
-
Alexandria, Virginia, USA, March 25-29
-
M. Orozco, Y. Asfaw, S. Shirmohammadi, A. Adler and A. E. Saddik, Haptic-Based Biometrics: A Feasibility Study, IEEE Virtual Reality Conference, Alexandria, Virginia, USA, March 25-29, 2006.
-
(2006)
Haptic-Based Biometrics: A Feasibility Study, IEEE Virtual Reality Conference
-
-
Orozco, M.1
Asfaw, Y.2
Shirmohammadi, S.3
Adler, A.4
Saddik, A.E.5
-
36
-
-
34548114499
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
Technical report CMU-CS-02-179. Carnegie Mellon University, October
-
A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson and G. R. Ganger, Storage-based intrusion detection: Watching storage activity for suspicious behavior, Technical report CMU-CS-02-179. Carnegie Mellon University, October 2002.
-
(2002)
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.N.4
Goodson, G.R.5
Ganger, G.R.6
-
37
-
-
34548122023
-
-
Stats and Analysis, Available at:, Retrieved June 7, 2006
-
Poker-edge.com, Stats and Analysis, Available at: http://www.poker-edge.com/stats.php, Retrieved June 7, 2006.
-
Poker-edge.com
-
-
-
38
-
-
20444496997
-
-
ACM Press, Washington DC, USA
-
M. Pusara and C. E. Brodley, User re-authentication via mouse movements, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ACM Press, Washington DC, USA, 2004, pp. 1-8.
-
(2004)
User re-authentication via mouse movements, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
39
-
-
34548111296
-
-
Edmonton, Albera, Canada
-
J. Ramon and N. Jacobs, Opponent modeling by analysing play, Proceedings of the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada, 2002.
-
(2002)
Opponent modeling by analysing play, Proceedings of the Computers and Games workshop on Agents in Computer Games
-
-
Ramon, J.1
Jacobs, N.2
-
40
-
-
34548109612
-
Quantifying the Quality of Web Authentication Mechanisms
-
Rinton Press, Available at
-
K. Renaud, Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, Journal of Web Engineering, Vol. 0, No. 0, Rinton Press, Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf, 2003.
-
(2003)
A Usability Perspective, Journal of Web Engineering
, vol.0
, Issue.0
-
-
Renaud, K.1
-
41
-
-
0012282403
-
Computer Intrusion: Detecting Maquerades
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus and Y. Vardi, Computer Intrusion: Detecting Maquerades, Statistical Science, 16 (2001), pp. 1-17.
-
(2001)
Statistical Science
, vol.16
, pp. 1-17
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
43
-
-
67650697862
-
-
Springer Verlag, Sept
-
S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern and C.-W. Hu, A Behavior-based Approach to Securing Email Systems, Mathematical Methods, Models and Architectures for Computer Networks Security, Springer Verlag, Sept. 2003.
-
(2003)
A Behavior-based Approach to Securing Email Systems, Mathematical Methods, Models and Architectures for Computer Networks Security
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
44
-
-
44349106280
-
Combining Behavior Models to Secure Email Systems
-
Available at:, April
-
S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang and O. Nimeskern, Combining Behavior Models to Secure Email Systems, CU Tech Report, Available at: wwwl.cs.columbia.edu/ids/publications/EMT-weijen.pdf, April 2003.
-
(2003)
CU Tech Report
-
-
Stolfo, S.J.1
Hu, C.-W.2
Li, W.-J.3
Hershkop, S.4
Wang, K.5
Nimeskern, O.6
-
45
-
-
84883097385
-
-
ACM Press, Hilton, Singapore
-
M. O. Trujillo, I. Shakra and A. E. Saddik, Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns, MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia, ACM Press, Hilton, Singapore, 2005, pp. 387-390.
-
(2005)
Haptic: The new biometrics-embedded media to recognizing and quantifying human patterns, MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia
, pp. 387-390
-
-
Trujillo, M.O.1
Shakra, I.2
Saddik, A.E.3
-
46
-
-
26444562687
-
The problem of concept drift: Definitions and related work
-
Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland
-
A. Tsymbal, The problem of concept drift: definitions and related work, Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland, 2004.
-
(2004)
-
-
Tsymbal, A.1
-
48
-
-
0042367634
-
-
O. D. Vel, A. Anderson, M. Corney and G. Mohay, Mining Email Content for Author Identification Forensics, SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis, 2001.
-
(2001)
Mining Email Content for Author Identification Forensics, SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis
-
-
Vel, O.D.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
49
-
-
34548117569
-
-
Buffalo, NY, February 24
-
R. V. Yampolskiy, Behavior Based Identification of Network Intruders, 19th Annual CSE Graduate Conference (Grad-Conf2006), Buffalo, NY, February 24, 2006.
-
(2006)
Behavior Based Identification of Network Intruders, 19th Annual CSE Graduate Conference (Grad-Conf2006)
-
-
Yampolskiy, R.V.1
-
50
-
-
34548123775
-
-
Orlando, Florida, 17-22 April
-
R. V. Yampolskiy and V. Govindaraju, Use of Behavioral Biometrics in Intrusion Detection and Online Gaming, Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, Florida, 17-22 April 2006.
-
(2006)
Use of Behavioral Biometrics in Intrusion Detection and Online Gaming, Biometric Technology for Human Identification III. SPIE Defense and Security Symposium
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
|