메뉴 건너뛰기




Volumn 2, Issue 10, 2007, Pages 76-88

Direct and indirect human computer interaction based biometrics

Author keywords

Behavioral biometrics; Human computer interaction; Intrusion detection

Indexed keywords

BEHAVIORAL RESEARCH; BIOMETRICS; INTRUSION DETECTION; MERCURY (METAL);

EID: 67649656892     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.2.10.76-88     Document Type: Article
Times cited : (14)

References (92)
  • 1
    • 0742290133 scopus 로고    scopus 로고
    • An introduction to biometric recognition
    • Video Technol
    • A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition, " IEEE Trans. Circuits Syst., Vol. 14., pp. 4-20, Video Technol, 2004.
    • (2004) IEEE Trans. Circuits Syst. , vol.14 , pp. 4-20
    • Jain, A.K.1    Ross, A.2    Prabhakar, S.3
  • 2
    • 84866686035 scopus 로고    scopus 로고
    • Motor-Skill Based Biometrics, In Assuring Business processes
    • Ed. G. Dhillon. Global Publishing, Las Vegas, NV, USA., April 11-12
    • R. V. Yampolskiy, "Motor-Skill Based Biometrics, " In Assuring Business processes, Proceedings of the 6th Annual Security Conference, Ed. G. Dhillon. Global Publishing, Las Vegas, NV, USA., April 11-12, 2007.
    • (2007) Proceedings of the 6th Annual Security Conference
    • Yampolskiy, R.V.1
  • 4
    • 34147151570 scopus 로고    scopus 로고
    • Available at, Retrieved July 12
    • J. Ilonen, "Keystroke dynamics, " Available at: www.it.lut.fi/kurssit/03-04/010970000/seminars /Ilonen.pdf, Retrieved July 12, 2006.
    • (2006) Keystroke dynamics
    • Ilonen, J.1
  • 12
    • 84883286001 scopus 로고    scopus 로고
    • Detecting Computer Intrusions Using Behavioral Biometrics
    • Security and Trust, St. Andrews, New Brunswick, Canada, October
    • A. A. E. Ahmed and I. Traore, "Detecting Computer Intrusions Using Behavioral Biometrics, " Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, October, 2005.
    • (2005) Third Annual Conference on Privacy
    • Ahmed, A.A.E.1    Traore, I.2
  • 13
    • 33745449771 scopus 로고    scopus 로고
    • Anomaly Intrusion Detection based on Biometrics
    • United States Military Academy, West Point, NY, June
    • A. A. E. Ahmed and I. Traore, "Anomaly Intrusion Detection based on Biometrics, " Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2005.
    • (2005) Workshop on Information Assurance
    • Ahmed, A.A.E.1    Traore, I.2
  • 14
    • 8844279221 scopus 로고    scopus 로고
    • A Behavioral Biometric System Based on Human Computer Interaction
    • H. Gamboa and V.-. A. Fred., 2004., "A Behavioral Biometric System Based on Human Computer Interaction, " In Proceedings of SPIE, 2004.
    • (2004) Proceedings of SPIE
    • Gamboa, H.1    Fred, V.-.A.2
  • 19
    • 84903111169 scopus 로고    scopus 로고
    • Available at, Retrieved October 2, 2005
    • Caslon-Analytics, Available at: http://www.caslon.com.au/biometricsnote6.htm, Retrieved October 2, 2005.
    • Caslon-Analytics
  • 20
    • 67650697862 scopus 로고    scopus 로고
    • A Behavior-based Approach to Securing Email Systems
    • Models and Architectures for Computer Networks Security, Sept
    • S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C.-W. Hu, "A Behavior-based Approach to Securing Email Systems, " Mathematical Methods, Models and Architectures for Computer Networks Security, Sept. 2003.
    • (2003) Mathematical Methods
    • Stolfo, S.J.1    Hershkop, S.2    Wang, K.3    Nimeskern, O.4    Hu, C.-W.5
  • 21
    • 44349106280 scopus 로고    scopus 로고
    • Combining Behavior Models to Secure Email Systems
    • April., Available at
    • S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang, and O. Nimeskern, "Combining Behavior Models to Secure Email Systems, " CU Tech Report, Available at: www1.cs.columbia.edu/ids/publications /EMT-weijen.pdf, April 2003.
    • (2003) CU Tech Report
    • Stolfo, S.J.1    Hu, C.-W.2    Li, W.-J.3    Hershkop, S.4    Wang, K.5    Nimeskern, O.6
  • 28
    • 84860278177 scopus 로고    scopus 로고
    • Multifactor Biometric Sketch Authentication
    • In A. Brömme and C. Busch, editors, Darmstadt, Germany, 24. July
    • A. Brömme and S. Al-Zubi, "Multifactor Biometric Sketch Authentication, " In A. Brömme and C. Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003.
    • (2003) Proceedings of the BIOSIG 2003
    • Brömme, A.1    Al-Zubi, S.2
  • 29
    • 84860283359 scopus 로고    scopus 로고
    • Using an Active Shape Structural Model for Biometric Sketch Recognition
    • Magdeburg, Germany, 10.-12. September
    • S. Al-Zubi, A. Brömme, and K. Tönnies, "Using an Active Shape Structural Model for Biometric Sketch Recognition, " In Proceedings of DAGM, Magdeburg, Germany, 10.-12. September 2003.
    • (2003) Proceedings of DAGM
    • Al-Zubi, S.1    Brömme, A.2    Tönnies, K.3
  • 30
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D. Y. Yeung and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models, " Pattern Recognition, vol. 36, pp. 229-243.
    • Pattern Recognition , vol.36 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 33
    • 0013378353 scopus 로고    scopus 로고
    • Detecting the Abnormal: Machine Learning in Computer Security
    • Purdue University Technical Report ECE-97-1, West Lafayette, January
    • T. Lane and C. E. Brodley, "Detecting the Abnormal: Machine Learning in Computer Security, " Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
    • (1997) Department of Electrical and Computer Engineering
    • Lane, T.1    Brodley, C.E.2
  • 36
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach, " Software Engineering, Vol. 21(3), pp. 188-199, 1995.
    • (1995) Software Engineering , vol.21 , Issue.3 , pp. 188-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 38
    • 3943082567 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses
    • CUCS Technical Report
    • F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo, "Detecting malicious software by monitoring anomalous windows registry accesses, " Technical report, CUCS Technical Report, 2001.
    • (2001) Technical report
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 46
    • 33751109662 scopus 로고    scopus 로고
    • Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective
    • Available at
    • K. Renaud, "Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, " Journal of Web Engineering, Vol. 0, No. 0, Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf, 2003.
    • (2003) Journal of Web Engineering , vol.0 , Issue.0
    • Renaud, K.1
  • 50
    • 34548122028 scopus 로고    scopus 로고
    • User Profiling for Intrusion Detection in Windows NT
    • T. Goldring, "User Profiling for Intrusion Detection in Windows NT, " Computing Science and Statistics, vol. 35, 2003.
    • (2003) Computing Science and Statistics , vol.35
    • Goldring, T.1
  • 51
    • 78651566234 scopus 로고    scopus 로고
    • An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology
    • MLI 03-2, George Mason University, Fairfax, VA, June
    • K. Kaufman, G. Cervone, and R. S. Michalski, "An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology, " Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA, June, 2003.
    • (2003) Reports of the Machine Learning and Inference Laboratory
    • Kaufman, K.1    Cervone, G.2    Michalski, R.S.3
  • 55
    • 0004048154 scopus 로고
    • Computer Security Threat Monitoring and Surveillance
    • Fort Washington, Pennsylvania, April
    • J. P. Anderson, "Computer Security Threat Monitoring and Surveillance, " Technical Report. James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
    • (1980) Technical Report. James P. Anderson Company
    • Anderson, J.P.1
  • 56
    • 0003201842 scopus 로고    scopus 로고
    • A markov chain model of temporal behavior for anomaly detection
    • Man, and Cybernetics Information Assurance and Security Workshop
    • N. Ye, "A markov chain model of temporal behavior for anomaly detection, " In Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, 2000.
    • (2000) Proceedings of the 2000 IEEE Systems
    • Ye, N.1
  • 60
    • 0036095845 scopus 로고    scopus 로고
    • Enhancing Profiles for Anomaly Detection Using Time Granularities
    • Y. Li, N. Wu, S. Jajodia, and X. S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities, " Journal of Computer Security, Vol. 10(1), pp. 137-157, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1 , pp. 137-157
    • Li, Y.1    Wu, N.2    Jajodia, S.3    Wang, X.S.4
  • 71
    • 33747630166 scopus 로고    scopus 로고
    • Neural Networks to Intrusion Detection
    • Rochester Institute of Technology. Rochester, NY, October
    • D. Novikov., "Neural Networks to Intrusion Detection., " MS thesis, Rochester Institute of Technology. Rochester, NY, October 2005.
    • (2005) MS thesis
    • Novikov, D.1
  • 73
    • 0031274649 scopus 로고    scopus 로고
    • Wide area Internet traffic patterns and characteristics
    • November
    • K. Thompson, G. Miller, and R. Wilder, "Wide area Internet traffic patterns and characteristics, " In IEEE Network, Vol. 11, pp. 10-23, November 1997.
    • (1997) IEEE Network , vol.11 , pp. 10-23
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 80
    • 84946410215 scopus 로고    scopus 로고
    • Detecting insider threats by monitoring system call activity
    • Man and Cybernetics Society Information Assurance Workshop, 18-20 June
    • N. Nguyen, P. Reiher, and G. H. Kuenning, "Detecting insider threats by monitoring system call activity, " IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 18-20 June 2003.
    • (2003) IEEE Systems
    • Nguyen, N.1    Reiher, P.2    Kuenning, G.H.3
  • 81
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the Behavior of a Program Using Multiple-Length N-grams
    • Cork, Ireland, Sept. 19-21
    • C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams, " Proceedings of the New Security Paradigms Workshop 2000, Cork, Ireland, Sept. 19-21, 2000.
    • (2000) Proceedings of the New Security Paradigms Workshop 2000
    • Marceau, C.1
  • 86
    • 26444562687 scopus 로고    scopus 로고
    • The problem of concept drift: Definitions and related work
    • Computer Science Department, Trinity College, Dublin, Ireland
    • A. Tsymbal, "The problem of concept drift: definitions and related work, " Technical Report TCDCS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland, 2004.
    • (2004) Technical Report TCDCS-2004-15
    • Tsymbal, A.1
  • 89
    • 84866671112 scopus 로고    scopus 로고
    • Poker-edge. com, Available at, Retrieved June 7
    • Poker-edge. com, "Stats and Analysis, " Available at: http://www.poker-edge.com/stats.php, Retrieved June 7, 2006.
    • (2006) Stats and Analysis
  • 90
    • 84866704262 scopus 로고    scopus 로고
    • Intrusion Detection Evaluation
    • DARPA, Available at
    • DARPA, "Intrusion Detection Evaluation, " MIT Lincoln Laboratory, Available at: http://www.ll.mit.edu/ist/ideval, 1998.
    • (1998) MIT Lincoln Laboratory
  • 91
    • 0013114810 scopus 로고    scopus 로고
    • Mining in a Data-Flow Environment: Experience in Network Intrusion Detection
    • San Diego, CA
    • W. Lee, S. Stolfo, and K. Mok, "Mining in a Data-Flow Environment: Experience in Network Intrusion Detection, " In Proceedings of the 5th ACM SIGKDD, San Diego, CA, 1999.
    • (1999) Proceedings of the 5th ACM SIGKDD
    • Lee, W.1    Stolfo, S.2    Mok, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.