-
1
-
-
37849008736
-
-
retrieved August 2, 2006
-
Adler, A., Youmaran, R. and Loyka, S. (2006) ‘Towards a Measure of Biometric Information’, retrieved August 2, 2006 from http://www.sce.carleton.ca/faculty/adler/publications/2006/youmaran-ccece2006-biometric-entropy.pdf.
-
(2006)
Towards a Measure of Biometric Information
-
-
Adler, A.1
Youmaran, R.2
Loyka, S.3
-
3
-
-
84883286001
-
Detecting computer intrusions using behavioural biometrics
-
St. Andrews, New Brunswick, Canada
-
Ahmed, A.A.E. and Traore, I. (2005b) ‘Detecting computer intrusions using behavioural biometrics’, Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada.
-
(2005)
Third Annual Conference on Privacy, Security and Trust
-
-
Ahmed, A.A.E.1
Traore, I.2
-
4
-
-
84860283359
-
Using an active shape structural model for biometric sketch recognition
-
Magdeburg, Germany
-
Al-Zubi, S., Brömme, A., and Tönnies, K. (2003) ‘Using an active shape structural model for biometric sketch recognition’, Proceedings of DAGM, Magdeburg, Germany.
-
(2003)
Proceedings of DAGM
-
-
Al-Zubi, S.1
Brömme, A.2
Tönnies, K.3
-
5
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Company, Fort Washington, Pennsylvania
-
Anderson, J.P. (1980) ‘Computer security threat monitoring and surveillance’, Technical Report, James P. Anderson Company, Fort Washington, Pennsylvania.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
7
-
-
3943082567
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
CUCS Technical Report
-
Apap, F., Honig, A., Hershkop, S., Eskin, E., and Stolfo, S. (2001) ‘Detecting malicious software by monitoring anomalous windows registry accesses’, Technical Report, CUCS Technical Report.
-
(2001)
Technical Report
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
9
-
-
84876806083
-
Biometric authentication revisited: understanding the impact of wolves in sheep’s clothing
-
Vancouver, BC, Canada
-
Ballard, L., Monrose, F., and Lopresti, D.P. (2006b) ‘Biometric authentication revisited: understanding the impact of wolves in sheep’s clothing’, Fifteenth USENIX Security Symposium, Vancouver, BC, Canada.
-
(2006)
Fifteenth USENIX Security Symposium
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.P.3
-
11
-
-
60749096615
-
Long-text keystroke biometric applications over the internet
-
Bartolacci, G., Curtin, M., Katzenberg, M., Nwana, N., Cha, S.-H., and Tappert, C.C. (2005) ‘Long-text keystroke biometric applications over the internet’, MLMTA.
-
(2005)
MLMTA
-
-
Bartolacci, G.1
Curtin, M.2
Katzenberg, M.3
Nwana, N.4
Cha, S.-H.5
Tappert, C.C.6
-
12
-
-
84901551283
-
Personal identifiers in musicians’ finger movement dynamics
-
Bella, S.D. and Palmer, C. (2006) ‘Personal identifiers in musicians’ finger movement dynamics’, Journal of Cognitive Neuroscience, Vol. 18.
-
(2006)
Journal of Cognitive Neuroscience
, vol.18
-
-
Bella, S.D.1
Palmer, C.2
-
16
-
-
84947881488
-
FAQ
-
retrieved July 22, 2005
-
BioPrivacy Initiative (2005) ‘FAQ’, BioPrivacy Initiative, retrieved July 22, 2005 from http://www.bioprivacy.org/faqmain.htm.
-
(2005)
BioPrivacy Initiative
-
-
BioPrivacy Initiative1
-
17
-
-
10044297649
-
-
Springer
-
Bolle, R., Connell, J., Pankanti, S., Ratha, N., and Senior, A. (2003) Guide to Biometrics, Springer.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
20
-
-
84860278177
-
Multifactor biometric sketch authentication
-
A. Brömme and C. Busch eds. Darmstadt, Germany
-
Brömme, A. and Al-Zubi, S. (2003) ‘Multifactor biometric sketch authentication’, in A. Brömme and C. Busch, eds., Proceedings of the BIOSIG 2003, Darmstadt, Germany.
-
(2003)
Proceedings of the BIOSIG 2003
-
-
Brömme, A.1
Al-Zubi, S.2
-
21
-
-
0036875048
-
Automatic speechreading with applications to speaker verification
-
Special Issue on Joint Audio-Visual Speech Processing
-
Broun, C.C., Zhang, X., Mersereau, R.M. and Clements, M.A. (2002) ‘Automatic speechreading with applications to speaker verification’, Eurasip Journal on Applied Signal Processing, Special Issue on Joint Audio-Visual Speech Processing.
-
(2002)
Eurasip Journal on Applied Signal Processing
-
-
Broun, C.C.1
Zhang, X.2
Mersereau, R.M.3
Clements, M.A.4
-
22
-
-
0013164114
-
-
Technical Report, Bell Labs, Lucent Technologies
-
Cahill, M., Lambert, D., Pinheiro, J., and Sun, D. (2000) ‘Detecting fraud in the real world’, Technical Report, Bell Labs, Lucent Technologies.
-
(2000)
Detecting fraud in the real world
-
-
Cahill, M.1
Lambert, D.2
Pinheiro, J.3
Sun, D.4
-
23
-
-
0031233424
-
Speaker recognition: a tutorial
-
Campbell, J.P. (1997) ‘Speaker recognition: a tutorial’, Proceedings of the IEEE, Vol. 85, No. 9, pp.1437–1462.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1437-1462
-
-
Campbell, J.P.1
-
24
-
-
33644816032
-
Performance evaluation of fingerprint verification systems
-
Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., and Jain, A.K. (2006) ‘Performance evaluation of fingerprint verification systems’, IEEE Transactions on Pattern Analysis Machine Intelligence, Vol. 28, pp.3–18.
-
(2006)
IEEE Transactions on Pattern Analysis Machine Intelligence
, vol.28
, pp. 3-18
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
Wayman, J.L.4
Jain, A.K.5
-
25
-
-
84947880300
-
-
retrieved October 2, 2005
-
Caslon Analytics (2005) Caslon-Analytics, retrieved October 2, 2005 from http://www.caslon.com.au/biometricsnote6.htm.
-
(2005)
Caslon-Analytics
-
-
Caslon Analytics1
-
27
-
-
0029762782
-
Cohort selection and word grammar effects for speaker recognition
-
Atlanta, GA
-
Colombi, J., Ruck, D., Rogers, S., Oxley, M., and Anderson, T. (1996) ‘Cohort selection and word grammar effects for speaker recognition’, IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, GA.
-
(1996)
IEEE International Conference on Acoustics, Speech, and Signal Processing
-
-
Colombi, J.1
Ruck, D.2
Rogers, S.3
Oxley, M.4
Anderson, T.5
-
29
-
-
79956145257
-
Keystroke biometric recognition on long-text input: a feasibility study
-
Hong Kong
-
Curtin, M., Tappert, C.C., Villani, M., Ngo, G., Simone, J., Fort, H.S., and Cha, S. (2006) ‘Keystroke biometric recognition on long-text input: a feasibility study’, Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006), Hong Kong.
-
(2006)
Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006)
-
-
Curtin, M.1
Tappert, C.C.2
Villani, M.3
Ngo, G.4
Simone, J.5
Fort, H.S.6
Cha, S.7
-
33
-
-
84947881493
-
TV that watches you: the prying eyes of interactive television
-
Democratic Media (2001) ‘TV that watches you: the prying eyes of interactive television’, A Report by the Center for Digital Democracy, retrieved from http://www.democraticmedia.org/privacyreport.pdf.
-
(2001)
A Report by the Center for Digital Democracy
-
-
Democratic Media1
-
36
-
-
0036288549
-
Recent advances in biometric person authentication
-
Orlando, Florida
-
Dugelay, J-L., Junqua, J-C., Kotropoulos, C., Kuhn, R., Perronnin, F., and Pitas, I. (2002) ‘Recent advances in biometric person authentication’, IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), Special Session on Biometrics, Orlando, Florida.
-
(2002)
IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), Special Session on Biometrics
-
-
Dugelay, J.-L.1
Junqua, J.-C.2
Kotropoulos, C.3
Kuhn, R.4
Perronnin, F.5
Pitas, I.6
-
37
-
-
26444499551
-
Multi-modal person recognition for vehicular applications
-
N.C. Oza et al. (eds.) LNCS 3541, Monterey, CA
-
Erdogan, H., Ercil, A., Ekenel, H., Bilgin, S., Eden, I., Kirisci, M. and Abut, H. (2005a) ‘Multi-modal person recognition for vehicular applications’, N.C. Oza et al. (eds.) MCS 2005, LNCS 3541, Monterey, CA.
-
(2005)
MCS 2005
-
-
Erdogan, H.1
Ercil, A.2
Ekenel, H.3
Bilgin, S.4
Eden, I.5
Kirisci, M.6
Abut, H.7
-
38
-
-
37349129755
-
Experiments on decision fusion for driver recognition
-
Sesimbra Portugal
-
Erdogan, H., Ozyagci, A.N., Eskil, T., Rodoper, M., Ercil, A. and Abut, H. (2005b) ‘Experiments on decision fusion for driver recognition’, Biennial on DSP for In-vehicle and Mobile Systems, Sesimbra Portugal.
-
(2005)
Biennial on DSP for In-vehicle and Mobile Systems
-
-
Erdogan, H.1
Ozyagci, A.N.2
Eskil, T.3
Rodoper, M.4
Ercil, A.5
Abut, H.6
-
39
-
-
33646007315
-
Multimodal person recognition for human-vehicle interaction
-
Erzin, E., Yemez, Y., Tekalp, A.M., Erçil, A., Erdogan, H. and Abut, H. (2006) ‘Multimodal person recognition for human-vehicle interaction’, IEEE MultiMedia.
-
(2006)
IEEE MultiMedia
-
-
Erzin, E.1
Yemez, Y.2
Tekalp, A.M.3
Erçil, A.4
Erdogan, H.5
Abut, H.6
-
41
-
-
70349100099
-
Anomaly detection using call-stack information
-
Oakland, CA, USA
-
Feng, H., Kolesnikov, O., Fogla, P., Lee, W. and Gong, W. (2003) ‘Anomaly detection using call-stack information’, Proceedings of the IEEE Security and Privacy, Oakland, CA, USA.
-
(2003)
Proceedings of the IEEE Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
45
-
-
8844279221
-
A behavioural biometric system based on human computer interaction
-
Gamboa, H. and Fred, A. (2004) ‘A behavioural biometric system based on human computer interaction’, Proceedings of SPIE.
-
(2004)
Proceedings of SPIE
-
-
Gamboa, H.1
Fred, A.2
-
47
-
-
85042797742
-
Learning program behaviour profiles for intrusion detection
-
Santa Clara, California
-
Ghosh, A.K., Schwartzbard, A. and Schatz, M. (1999) ‘Learning program behaviour profiles for intrusion detection’, Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California.
-
(1999)
Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
50
-
-
34548122028
-
User profiling for intrusion detection in Windows NT
-
Goldring, T. (2003) ‘User profiling for intrusion detection in Windows NT’, Computing Science and Statistics, Vol. 35.
-
(2003)
Computing Science and Statistics
, vol.35
-
-
Goldring, T.1
-
52
-
-
27144437024
-
On the feasibility of intrusion detection inside workstation disks
-
Carnegie Mellon University
-
Griffin, J.L., Pennington, A.G., Bucy, J.S., Choundappan, D., Muralidharan, N. and Ganger, G.R. (2003) ‘On the feasibility of intrusion detection inside workstation disks’, Technical Report CMU-PDL-03-106, Carnegie Mellon University.
-
(2003)
Technical Report CMU-PDL-03-106
-
-
Griffin, J.L.1
Pennington, A.G.2
Bucy, J.S.3
Choundappan, D.4
Muralidharan, N.5
Ganger, G.R.6
-
53
-
-
26944496794
-
Detecting fraud in mobile telephony using neural networks
-
Springer-Verlag
-
Grosser, H., Britos, H., and García-Martínez, R. (2005) ‘Detecting fraud in mobile telephony using neural networks’, Lecture Notes in Artificial Intelligence, Springer-Verlag.
-
(2005)
Lecture Notes in Artificial Intelligence
-
-
Grosser, H.1
Britos, H.2
García-Martínez, R.3
-
54
-
-
47849125043
-
Keystroke analysis of different languages: a case study
-
Springer-Verlag, Madrid, Spain
-
Gunetti, D., Picardi, C. and Ruffo, G. (2005) ‘Keystroke analysis of different languages: a case study’, Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Springer-Verlag, Madrid, Spain.
-
(2005)
Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005)
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
55
-
-
37349092111
-
Digital forensic analysis of e-mails: a trusted e-mail protocol
-
Gupta, G., Mazumdar, C. and Rao, M.S. (2004) ‘Digital forensic analysis of e-mails: a trusted e-mail protocol’, International Journal of Digital Evidence, Vol. 2.
-
(2004)
International Journal of Digital Evidence
, vol.2
-
-
Gupta, G.1
Mazumdar, C.2
Rao, M.S.3
-
56
-
-
85149113847
-
Linguistic profiling for author recognition and verification
-
Halteren, H.V. (2004) ‘Linguistic profiling for author recognition and verification’, Proceedings of ACL-2004.
-
(2004)
Proceedings of ACL-2004
-
-
Halteren, H.V.1
-
57
-
-
84947881497
-
Polymer thick-film sensors: possibilities for smartcard biometrics
-
Henderson, N.J., Papakostas, T.V., White, N.M. and Hartel, P.H. (2001) ‘Polymer thick-film sensors: possibilities for smartcard biometrics’, Proceedings of Sensors and their applications XI.
-
(2001)
Proceedings of Sensors and their applications XI
-
-
Henderson, N.J.1
Papakostas, T.V.2
White, N.M.3
Hartel, P.H.4
-
63
-
-
11244328196
-
Biometric identification using driving behavioural signals
-
Igarashi, K., Miyajima, C., Itou, K., Takeda, K., Itakura, F. and Abut, H. (2004) ‘Biometric identification using driving behavioural signals’, Proc. 2004 IEEE International Conference on Multimedia and Expo.
-
(2004)
Proc. 2004 IEEE International Conference on Multimedia and Expo
-
-
Igarashi, K.1
Miyajima, C.2
Itou, K.3
Takeda, K.4
Itakura, F.5
Abut, H.6
-
64
-
-
0029267472
-
State transition analysis: a rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R.A. and Porras, P.A. (1995) ‘State transition analysis: a rule-based intrusion detection approach’, Software Engineering.
-
(1995)
Software Engineering
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
65
-
-
34147151570
-
-
retrieved July 12, 2006
-
Ilonen, J. (2006) ‘Keystroke dynamics’, retrieved July 12, 2006) from www.it.lut.fi/kurssit/03-04/010970000/seminars/Ilonen.pdf.
-
(2006)
Keystroke dynamics
-
-
Ilonen, J.1
-
66
-
-
33745159644
-
Smile and laughter recognition using speech processing and face recognition from conversation video
-
Ito, A., Wang, X., Suzuki, M. and Makino, S. (2005) ‘Smile and laughter recognition using speech processing and face recognition from conversation video’, Proceedings of the 2005 International Conference on Cyberworlds.
-
(2005)
Proceedings of the 2005 International Conference on Cyberworlds
-
-
Ito, A.1
Wang, X.2
Suzuki, M.3
Makino, S.4
-
70
-
-
8844259623
-
Can soft biometric traits assist user recognition?
-
Orlando, FL
-
Jain, A.K., Dass, S.C. and Nandakumar, K. (2004a) ‘Can soft biometric traits assist user recognition?’, Proceedings of SPIE Defense and Security Symposium, Orlando, FL.
-
(2004)
Proceedings of SPIE Defense and Security Symposium
-
-
Jain, A.K.1
Dass, S.C.2
Nandakumar, K.3
-
72
-
-
10044236375
-
Biometrics: a grand challenge
-
Cambridge, UK
-
Jain, A.K., Pankanti, S., Prabhakar, S., Hong, L. and Ross, A. (2004c) ‘Biometrics: a grand challenge’, Proceedings of the International Conference on Pattern Recognition, Cambridge, UK.
-
(2004)
Proceedings of the International Conference on Pattern Recognition
-
-
Jain, A.K.1
Pankanti, S.2
Prabhakar, S.3
Hong, L.4
Ross, A.5
-
77
-
-
84947881501
-
-
retrieved August 3, 2006
-
Jervis, E., Kennedy, M., Kepler, N. and Kim, J. (2006) ‘Trends in biometrics and user acceptance’, retrieved August 3, 2006 from http://www.simson.net/ref/2005/csci_e-170/p1/future.pdf.
-
(2006)
Trends in biometrics and user acceptance
-
-
Jervis, E.1
Kennedy, M.2
Kepler, N.3
Kim, J.4
-
78
-
-
0031220766
-
Acoustic-labial speaker verification
-
Jourlin, P., Luettin, J., Genoud, D., and Wassner, H. (1997) ‘Acoustic-labial speaker verification’, Pattern Recognition Letters.
-
(1997)
Pattern Recognition Letters
-
-
Jourlin, P.1
Luettin, J.2
Genoud, D.3
Wassner, H.4
-
80
-
-
4344637549
-
Identification of humans using gait
-
Kale, A., Sundaresan, A., Rajagopalan, A.N., Cuntoor, N., Roychowdhury, A., Kruger, V., and Chellappa, R. (2004) ‘Identification of humans using gait’, IEEE Transactions on Image Processing.
-
(2004)
IEEE Transactions on Image Processing
-
-
Kale, A.1
Sundaresan, A.2
Rajagopalan, A.N.3
Cuntoor, N.4
Roychowdhury, A.5
Kruger, V.6
Chellappa, R.7
-
83
-
-
78651566234
-
An application of symbolic learning to intrusion detection: preliminary results from the LUS methodology
-
George Mason University, Fairfax, VA
-
Kaufman, K., Cervone, G., and Michalski, R.S. (2003) ‘An application of symbolic learning to intrusion detection: preliminary results from the LUS methodology’, Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA.
-
(2003)
Reports of the Machine Learning and Inference Laboratory, MLI 03-2
-
-
Kaufman, K.1
Cervone, G.2
Michalski, R.S.3
-
84
-
-
33750798519
-
Baseline profile stability for network anomaly detection
-
Las Vegas, NV
-
Kim, Y., Jo, J.-Y., and Suh, K. (2006) ‘Baseline profile stability for network anomaly detection’, IEEE ITNG 2006, Internet and Wireless Network Security Track, Las Vegas, NV.
-
(2006)
IEEE ITNG 2006, Internet and Wireless Network Security Track
-
-
Kim, Y.1
Jo, J.-Y.2
Suh, K.3
-
87
-
-
33750722790
-
Text categorisation for authorship verification
-
Fort Lauderdale, Florida
-
Koppel, M., Schler, J., and Mughaz, D. (2004) ‘Text categorisation for authorship verification’, Eighth International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, Florida.
-
(2004)
Eighth International Symposium on Artificial Intelligence and Mathematics
-
-
Koppel, M.1
Schler, J.2
Mughaz, D.3
-
92
-
-
0013378353
-
-
Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette
-
Lane, T. and Brodley, C.E. (1997b) ‘Detecting the abnormal: machine learning in computer security’, Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette.
-
(1997)
Detecting the abnormal: machine learning in computer security
-
-
Lane, T.1
Brodley, C.E.2
-
93
-
-
0242323507
-
A new similarity measure based on intra-class statistics for biometric systems
-
Lee, K. and Park, H. (2003) ‘A new similarity measure based on intra-class statistics for biometric systems’, ETRI Journal.
-
(2003)
ETRI Journal
-
-
Lee, K.1
Park, H.2
-
94
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, CA
-
Lee, W., Stolfo, S.J., and Mok, K.W. (1999) ‘A data mining framework for building intrusion detection models’, IEEE Symposium on Security and Privacy, Oakland, CA.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
96
-
-
0036095845
-
Enhancing profiles for anomaly detection using time granularities
-
Li, Y., Wu, N., Jajodia, S., and Wang, X.S. (2002) ‘Enhancing profiles for anomaly detection using time granularities’, Journal of Computer Security.
-
(2002)
Journal of Computer Security
-
-
Li, Y.1
Wu, N.2
Jajodia, S.3
Wang, X.S.4
-
105
-
-
84901513294
-
-
retrieved July 28, 2006
-
Mainguet, J-F. (2006) ‘Biometrics’, retrieved July 28, 2006 from http://perso.orange.fr/fingerchip/biometrics/biometrics.htm.
-
(2006)
Biometrics
-
-
Mainguet, J.-F.1
-
106
-
-
0034593307
-
Characterising the behaviour of a program using multiple-length n-grams
-
Cork, Ireland
-
Marceau, C. (2000) ‘Characterising the behaviour of a program using multiple-length n-grams’, Proceedings of the New Security Paradigms Workshop 2000, Cork, Ireland.
-
(2000)
Proceedings of the New Security Paradigms Workshop 2000
-
-
Marceau, C.1
-
108
-
-
0009643459
-
Lip signatures for automatic person recognition
-
Mason, J.S.D., Brand, J., Auckenthaler, R., Deravi, F., and Chibelushi, C. (1999) ‘Lip signatures for automatic person recognition’ IEEE Workshop, MMSP.
-
(1999)
IEEE Workshop, MMSP
-
-
Mason, J.S.D.1
Brand, J.2
Auckenthaler, R.3
Deravi, F.4
Chibelushi, C.5
-
112
-
-
20444450590
-
Person authentication using ASM based lip shape and intensity information
-
Mok, L., Lau, W.H., Leung, S.H., Wang, S.L., and Yan, H. (2004) ‘Person authentication using ASM based lip shape and intensity information’, International Conference on Image Processing.
-
(2004)
International Conference on Image Processing
-
-
Mok, L.1
Lau, W.H.2
Leung, S.H.3
Wang, S.L.4
Yan, H.5
-
114
-
-
84947881509
-
Signature verification: a popular biometric technology
-
Miami, Florida, USA
-
Muralidharan, N. and Wunnava, S. (2004) ‘Signature verification: a popular biometric technology’, Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004), Miami, Florida, USA.
-
(2004)
Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004)
-
-
Muralidharan, N.1
Wunnava, S.2
-
115
-
-
0031070158
-
Automatic online signature verification
-
Nalwa, V.S. (1997) ‘Automatic online signature verification’, Proceedings of the IEEE.
-
(1997)
Proceedings of the IEEE
-
-
Nalwa, V.S.1
-
116
-
-
84946410215
-
Detecting insider threats by monitoring system call activity
-
Nguyen, N., Reiher, P., and Kuenning, G.H. (2003) ‘Detecting insider threats by monitoring system call activity’, IEEE Systems, Man and Cybernetics Society Information Assurance Workshop.
-
(2003)
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
118
-
-
33750804406
-
Anomaly detection based intrusion detection
-
Las Vegas, Nevada, USA
-
Novikov, D., Yampolskiy, R.V., and Reznik, L. (2006a) ‘Anomaly detection based intrusion detection’, Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, Nevada, USA.
-
(2006)
Third International Conference on Information Technology: New Generations (ITNG 2006)
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
119
-
-
47849130842
-
Artificial intelligence approaches for intrusion detection
-
Long Island, New York
-
Novikov, D., Yampolskiy, R.V., and Reznik, L. (2006b) ‘Artificial intelligence approaches for intrusion detection’, Long Island Systems Applications and Technology Conference (LISAT 2006), Long Island, New York.
-
(2006)
Long Island Systems Applications and Technology Conference (LISAT 2006)
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
120
-
-
33747630166
-
-
MS Thesis, Rochester Institute of Technology, Rochester, NY
-
Novikov, D. (2005) Neural Networks to Intrusion Detection, MS Thesis, Rochester Institute of Technology, Rochester, NY.
-
(2005)
Neural Networks to Intrusion Detection
-
-
Novikov, D.1
-
122
-
-
33845498470
-
Automatic identification of participants in haptic systems
-
Ottawa, Canada
-
Orozco, M., Asfaw, Y., Adler, A., Shirmohammadi, S., and Saddik, A.E. (2005) ‘Automatic identification of participants in haptic systems’, 2005 IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada.
-
(2005)
2005 IEEE Instrumentation and Measurement Technology Conference
-
-
Orozco, M.1
Asfaw, Y.2
Adler, A.3
Shirmohammadi, S.4
Saddik, A.E.5
-
123
-
-
33750122385
-
Haptic-based biometrics: a feasibility study
-
Alexandria, Virginia, USA
-
Orozco, M., Asfaw, Y., Shirmohammadi, S., Adler, A., and Saddik, A.E. (2006) ‘Haptic-based biometrics: a feasibility study’, IEEE Virtual Reality Conference, Alexandria, Virginia, USA.
-
(2006)
IEEE Virtual Reality Conference
-
-
Orozco, M.1
Asfaw, Y.2
Shirmohammadi, S.3
Adler, A.4
Saddik, A.E.5
-
124
-
-
67549101386
-
Dynamic approach for face recognition using digital image skin correlation
-
New York
-
Pamudurthy, S., Guan, E., Mueller, K., and Rafailovich, M. (2005) ‘Dynamic approach for face recognition using digital image skin correlation’, Audio and Video-based Biometric Person Authentication (AVBPA), New York.
-
(2005)
Audio and Video-based Biometric Person Authentication (AVBPA)
-
-
Pamudurthy, S.1
Guan, E.2
Mueller, K.3
Rafailovich, M.4
-
125
-
-
34548114499
-
Storage-based intrusion detection: watching storage activity for suspicious behaviour
-
Carnegie Mellon University
-
Pennington, A.G., Strunk, J.D., Griffin, J.L., Soules, C.A.N., Goodson, G.R., and Ganger, G.R. (2002) ‘Storage-based intrusion detection: watching storage activity for suspicious behaviour’, Technical Report CMU-CS-02-179’, Carnegie Mellon University.
-
(2002)
Technical Report CMU-CS-02-179
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.N.4
Goodson, G.R.5
Ganger, G.R.6
-
126
-
-
0024861588
-
Automatic signature verification and writer identification: the state of the art
-
Plamondon, R. and Lorette, G. (1989) ‘Automatic signature verification and writer identification: the state of the art’, Pattern Recognition, Vol. 22, No. 2, pp.107–131.
-
(1989)
Pattern Recognition
, vol.22
, Issue.2
, pp. 107-131
-
-
Plamondon, R.1
Lorette, G.2
-
127
-
-
84947881512
-
Stats and analysis
-
Poker-edge retrieved June 7, 2006
-
Poker-edge (2006) ‘Stats and analysis’, Poker-edge.com, retrieved June 7, 2006 from http://www.poker-edge.com/stats.php.
-
(2006)
Poker-edge.com
-
-
-
129
-
-
20444496997
-
User re-authentication via mouse movements
-
ACM Press, Washington, DC, USA
-
Pusara, M. and Brodley, C.E. (2004) ‘User re-authentication via mouse movements’, VizSEC/DMSEC ‘04: Proceedings of the 2004 ACM Workshop on Visualisation and Data Mining for Computer Security, ACM Press, Washington, DC, USA.
-
(2004)
VizSEC/DMSEC ‘04: Proceedings of the 2004 ACM Workshop on Visualisation and Data Mining for Computer Security
-
-
Pusara, M.1
Brodley, C.E.2
-
131
-
-
47849107001
-
Opponent modeling by analysing play
-
Edmonton, Alberta, Canada
-
Ramon, J. and Jacobs, N. (2002) ‘Opponent modeling by analysing play’, Proceedings of the Computers and Games Workshop on Agents in Computer Games, Edmonton, Alberta, Canada.
-
(2002)
Proceedings of the Computers and Games Workshop on Agents in Computer Games
-
-
Ramon, J.1
Jacobs, N.2
-
132
-
-
26844484109
-
Automated biometrics
-
Rio de Janeiro, Brazil
-
Ratha, N.K., Senior, A., and Bolle, R.M. (2001) ‘Automated biometrics’, Proceedings of International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil.
-
(2001)
Proceedings of International Conference on Advances in Pattern Recognition
-
-
Ratha, N.K.1
Senior, A.2
Bolle, R.M.3
-
133
-
-
33751109662
-
Quantifying the quality of web authentication mechanisms: a usability perspective
-
Rinton Press
-
Renaud, K. (2003) ‘Quantifying the quality of web authentication mechanisms: a usability perspective’, Journal of Web Engineering, Rinton Press, retrieved from http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf.
-
(2003)
Journal of Web Engineering
-
-
Renaud, K.1
-
137
-
-
22044453894
-
Cross cultural aspects of biometrics
-
Schimke, S., Vielhauer, C., Dutta, P.K., Basu, T.K., Rosa, A.D., Hansen, J., Yegnanarayana, B., and Dittmann, J. (2004) ‘Cross cultural aspects of biometrics’, Biometrics: Challenges Arising from Theory to Practice.
-
(2004)
Biometrics: Challenges Arising from Theory to Practice
-
-
Schimke, S.1
Vielhauer, C.2
Dutta, P.K.3
Basu, T.K.4
Rosa, A.D.5
Hansen, J.6
Yegnanarayana, B.7
Dittmann, J.8
-
138
-
-
0012282403
-
Computer intrusion: detecting masquerades
-
Schonlau, M., Dumouchel, W., Ju, W-H., Karr, A.F., Theus, M., and Vardi, Y. (2001) ‘Computer intrusion: detecting masquerades’, Statistical Science, Vol. 16, pp.1–17.
-
(2001)
Statistical Science
, vol.16
, pp. 1-17
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
142
-
-
70350126950
-
-
Instituto Nacional de Pesquisas Espanciais
-
Silva, L.D.S., Santos, A.F.D., Silva, J.D.D., and Montes, A. (2004) A Neural Network Application for Attack Detection in Computer Networks, Instituto Nacional de Pesquisas Espanciais.
-
(2004)
A Neural Network Application for Attack Detection in Computer Networks
-
-
Silva, L.D.S.1
Santos, A.F.D.2
Silva, J.D.D.3
Montes, A.4
-
143
-
-
66149159137
-
A survey of unimodal biometric methods
-
Las Vegas, Nevada, USA
-
Solayappan, N. and Latifi, S. (2006) ‘A survey of unimodal biometric methods’, Security and Management, Las Vegas, Nevada, USA.
-
(2006)
Security and Management
-
-
Solayappan, N.1
Latifi, S.2
-
146
-
-
85050214833
-
Automatic authorship attribution
-
Bergen, Norway
-
Stamatatos, E., Fakotakis, N., and Kokkinakis, G. (1999) ‘Automatic authorship attribution’, Proc. Ninth Conf. European Chap. Assoc. Computational Linguistics, Bergen, Norway.
-
(1999)
Proc. Ninth Conf. European Chap. Assoc. Computational Linguistics
-
-
Stamatatos, E.1
Fakotakis, N.2
Kokkinakis, G.3
-
149
-
-
67650697862
-
A behaviour-based approach to securing e-mail systems
-
Springer Verlag
-
Stolfo, S.J., Hershkop, S., Wang, K., Nimeskern, O., and Hu, C-W. (2003a) ‘A behaviour-based approach to securing e-mail systems’, Mathematical Methods, Models and Architectures for Computer Networks Security, Springer Verlag.
-
(2003)
Mathematical Methods, Models and Architectures for Computer Networks Security
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
150
-
-
44349106280
-
-
CU Tech Report
-
Stolfo, S.J., Hu, C-W., Li, W-J., Hershkop, S., Wang, K., and Nimeskern, O. (2003b) ‘Combining behaviour models to secure e-mail systems’, CU Tech Report, retrieved from http://www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf.
-
(2003)
Combining behaviour models to secure e-mail systems
-
-
Stolfo, S.J.1
Hu, C.-W.2
Li, W.-J.3
Hershkop, S.4
Wang, K.5
Nimeskern, O.6
-
151
-
-
84947880399
-
-
Masters Thesis, The Institute for Genomic Research, Rockville, Maryland, USA
-
Stum, A. (2000) Cluster Analysis for Large Scale Gene Expression Studies, Masters Thesis, The Institute for Genomic Research, Rockville, Maryland, USA.
-
(2000)
Cluster Analysis for Large Scale Gene Expression Studies
-
-
Stum, A.1
-
152
-
-
0031274649
-
Wide-area internet traffic patterns and characteristics
-
Thompson, K., Miller, G., and Wilder, R. (1997) ‘Wide-area internet traffic patterns and characteristics’, IEEE Network.
-
(1997)
IEEE Network
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
154
-
-
33744976289
-
Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals
-
Tsai, W-H. and Wang, H-M. (2006) ‘Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals’, IEEE Transactions on Audio, Speech and Language Processing.
-
(2006)
IEEE Transactions on Audio, Speech and Language Processing
-
-
Tsai, W.-H.1
Wang, H.-M.2
-
155
-
-
26444562687
-
-
Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland
-
Tsymbal, A. (2004) ‘The problem of concept drift: definitions and related work’, Technical Report TCD-CS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland.
-
(2004)
The problem of concept drift: definitions and related work
-
-
Tsymbal, A.1
-
156
-
-
10044222391
-
Biometric cryptosystems: issues and challenges
-
Uludag, U., Pankanti, S., Prabhakar, S., and Jain, A. K. (2004) ‘Biometric cryptosystems: issues and challenges’, Proceedings of the IEEE.
-
(2004)
Proceedings of the IEEE
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
158
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
Vel, O.D., Anderson, A., Corney, M., and Mohay, G. (2001) ‘Mining e-mail content for author identification forensics’, SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis.
-
(2001)
SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis
-
-
Vel, O.D.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
159
-
-
84877973386
-
Biometric verification based on grip-pattern recognition
-
Veldhuis, R.N.J., Bazen, A.M., Kauffman, J.A., and Hartel, P.H. (2004) ‘Biometric verification based on grip-pattern recognition’, Security, Steganography, and Watermarking of Multimedia Contents.
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents
-
-
Veldhuis, R.N.J.1
Bazen, A.M.2
Kauffman, J.A.3
Hartel, P.H.4
-
162
-
-
84880174811
-
Detecting intrusions using system calls: alternative data models
-
Oakland, CA, USA
-
Warrender, C., Forrest, S., and Pearlmutter, B. (1999) ‘Detecting intrusions using system calls: alternative data models’, Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
164
-
-
84860263372
-
Biometric identification using song-based eye blink patterns
-
Las Vegas, NV
-
Westeyn, T., Pesti, P., Park, K., and Starner, T. (2005) ‘Biometric identification using song-based eye blink patterns’, Human Computer Interaction International (HCII), Las Vegas, NV.
-
(2005)
Human Computer Interaction International (HCII)
-
-
Westeyn, T.1
Pesti, P.2
Park, K.3
Starner, T.4
-
169
-
-
84947881522
-
Motor-skill based biometrics
-
G. Dhillon (ed), Global Publishing, Las Vegas, NV, USA
-
th Annual Security Conference, G. Dhillon (ed), Global Publishing, Las Vegas, NV, USA.
-
(2007)
th Annual Security Conference
-
-
Yampolskiy, R.V.1
-
171
-
-
37349076344
-
Use of behavioural biometrics in intrusion detection and online gaming. biometric technology for human identification III
-
Orlando, Florida
-
Yampolskiy, R.V. and Govindaraju, V. (2006b) ‘Use of behavioural biometrics in intrusion detection and online gaming. biometric technology for human identification III’, SPIE Defense and Security Symposium, Orlando, Florida.
-
(2006)
SPIE Defense and Security Symposium
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
172
-
-
35649007957
-
Dissimilarity functions for behaviour-based biometrics
-
Orlando, Florida
-
Yampolskiy, R.V. and Govindaraju, V. (2007) ‘Dissimilarity functions for behaviour-based biometrics’, Biometric Technology for Human Identification IV, SPIE Defense and Security Symposium, Orlando, Florida.
-
(2007)
Biometric Technology for Human Identification IV, SPIE Defense and Security Symposium
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
174
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioural models
-
Yeung, D.Y. and Ding, Y. (2002) ‘Host-based intrusion detection using dynamic and static behavioural models’, Pattern Recognition, Vol. 36, pp.229–243.
-
(2002)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
|