메뉴 건너뛰기




Volumn 7, Issue 1, 2009, Pages 7-15

A bioinformatics based approach to user authentication via keystroke dynamics

Author keywords

Behavioural biometrics; Keystroke dynamics; Multiple sequence alignment; Position specific scoring matrix; User identification

Indexed keywords

ACCESS CONTROL; ALIGNMENT; BIOINFORMATICS; BIOMETRICS; DYNAMICS;

EID: 60349131555     PISSN: 15986446     EISSN: None     Source Type: Journal    
DOI: 10.1007/s12555-009-0102-2     Document Type: Article
Times cited : (42)

References (22)
  • 2
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A Key to User Identification
    • A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A Key to User Identification," IEEE Security and Privacy, vol. 2, no. 5, pp. 40-47, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 3
    • 60349130920 scopus 로고    scopus 로고
    • R. Gaines, W. Lisowski, S. Press, and S. Shapiro, Authentication by keystroke timing: Some preliminary results, Rand Report R-256-NSF, Rand Corp, 1980.
    • R. Gaines, W. Lisowski, S. Press, and S. Shapiro, "Authentication by keystroke timing: Some preliminary results," Rand Report R-256-NSF, Rand Corp, 1980.
  • 4
    • 0025384135 scopus 로고
    • Identity authorization based on keystroke latencies
    • R. Joyce and G. Gupta, "Identity authorization based on keystroke latencies," Communications of the ACM, vol. 33, no. 2, pp 168-176, 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 7
    • 38249026503 scopus 로고
    • An application of fuzzy algorithms in a computer access security system
    • B. Hussien, S. Bleha, and R. McLaren, "An application of fuzzy algorithms in a computer access security system," Pattern Recognition Letters, vol. 9, pp. 39-43, 1989.
    • (1989) Pattern Recognition Letters , vol.9 , pp. 39-43
    • Hussien, B.1    Bleha, S.2    McLaren, R.3
  • 8
    • 0031275601 scopus 로고    scopus 로고
    • Enhanced password authentication through fuzzy logic
    • Nov/Dec
    • W. G. de Ru and J. Eloff, "Enhanced password authentication through fuzzy logic," IEEE Expert, vol. 12, no. 6, pp. 38-45, Nov/Dec, 1997.
    • (1997) IEEE Expert , vol.12 , Issue.6 , pp. 38-45
    • de Ru, W.G.1    Eloff, J.2
  • 10
    • 0031281215 scopus 로고    scopus 로고
    • Simulation evaluation study of neural network techniques to computer user identification
    • M. S. Obaidat and B. A. Sadoun, "Simulation evaluation study of neural network techniques to computer user identification," Information Sciences, vol. 102, pp. 239-258, 1997.
    • (1997) Information Sciences , vol.102 , pp. 239-258
    • Obaidat, M.S.1    Sadoun, B.A.2
  • 11
    • 33744952566 scopus 로고    scopus 로고
    • GA SVM wrapper ensemble for keystroke dynamics authentication
    • Hong Kong, pp
    • K. S. Sung and S. Cho, "GA SVM wrapper ensemble for keystroke dynamics authentication," Proc. of International Conference on Biometrics, Hong Kong, pp. 654-660, 2006.
    • (2006) Proc. of International Conference on Biometrics , pp. 654-660
    • Sung, K.S.1    Cho, S.2
  • 13
    • 60349113493 scopus 로고    scopus 로고
    • K. Revert, S. Magalhaes, and H. Santos, Developing a keystroke dynamics based agent using rough sets, The 2005 IEEE/WIC/ACM Interna-tional Joint Conference on Web Intelligence and Intelligent Agent Technology Workshop on Rough Sets and Soft Computing in Intelligent Agents and Web Technology, Compiegne, France, pp. 56-61, 19-22 September, 2005.
    • K. Revert, S. Magalhaes, and H. Santos, "Developing a keystroke dynamics based agent using rough sets," The 2005 IEEE/WIC/ACM Interna-tional Joint Conference on Web Intelligence and Intelligent Agent Technology Workshop on Rough Sets and Soft Computing in Intelligent Agents and Web Technology, Compiegne, France, pp. 56-61, 19-22 September, 2005.
  • 14
    • 38349044845 scopus 로고    scopus 로고
    • On the use of multiple sequence alignment for user authentication via keystroke dynamics
    • University of East London, pp, 16-18 April
    • K. Revett, "On the use of multiple sequence alignment for user authentication via keystroke dynamics," Proc. of International Conference on Global eSecurity, University of East London, pp. 112-120, 16-18 April, 2007.
    • (2007) Proc. of International Conference on Global eSecurity , pp. 112-120
    • Revett, K.1
  • 16
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," J. Mol. Biol. vol. 48, pp. 443-453, 1970.
    • (1970) J. Mol. Biol , vol.48 , pp. 443-453
    • Needleman, S.B.1    Wunsch, C.D.2
  • 17
    • 0019887799 scopus 로고
    • Identification of common molecular subsequences
    • T. F. Smith and M. S. Waterman, "Identification of common molecular subsequences," J. Mol. Biol. vol. 147, pp. 95-197, 1981.
    • (1981) J. Mol. Biol , vol.147 , pp. 95-197
    • Smith, T.F.1    Waterman, M.S.2
  • 18
    • 0031070158 scopus 로고    scopus 로고
    • Automatic on-line signature verification
    • February
    • V. Nalwa, "Automatic on-line signature verification," Proceedings of the IEEE, vol. 85, pp. 213-239, February 1997.
    • (1997) Proceedings of the IEEE , vol.85 , pp. 213-239
    • Nalwa, V.1
  • 20
    • 0029209272 scopus 로고
    • Robust text-independent speaker identification using Gaussian mixture speaker models
    • D. A. Reynolds, and R. C. Rose, "Robust text-independent speaker identification using Gaussian mixture speaker models," IEEE Trans on Speech and Audio Processing, vol. 3, no. 1, pp. 72-83, 1995.
    • (1995) IEEE Trans on Speech and Audio Processing , vol.3 , Issue.1 , pp. 72-83
    • Reynolds, D.A.1    Rose, R.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.