-
1
-
-
76649083437
-
-
Red herring mobiles scream for help: Uk-based mobile security company adds security to mobile phones (October 2006)
-
Red herring mobiles scream for help: Uk-based mobile security company adds security to mobile phones (October 2006)
-
-
-
-
3
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence 12(12), 1217-1222 (1990)
-
(1990)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussien, B.3
-
6
-
-
26844493026
-
Authentication of users on mobile telephones-A survey of attitudes and practices
-
Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones-A survey of attitudes and practices. Computers & Security 24(7), 519-527 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.L.1
Furnell, S.M.2
-
8
-
-
85129530187
-
*: An Instance-based Learner Using an Entropic Distance Measure
-
Morgan Kaufman Publishers, Inc, San Francisco
-
*: An Instance-based Learner Using an Entropic Distance Measure. In: Machine Learning-International Workshop then Conference, pp. 108-114. Morgan Kaufman Publishers, Inc., San Francisco (1995)
-
(1995)
Machine Learning-International Workshop then Conference
, pp. 108-114
-
-
Cleary, J.G.1
Trigg, L.E.2
-
12
-
-
76649084063
-
-
BioPassword Inc
-
BioPassword Inc., http://www.biopassword.com
-
-
-
-
13
-
-
0031277461
-
An Efficient Method to Construct a Radial Basis Function Neural Network Classifier
-
Hwang, Y.S., Bang, S.Y.: An Efficient Method to Construct a Radial Basis Function Neural Network Classifier. Neural Networks 10(8), 1495-1503 (1997)
-
(1997)
Neural Networks
, vol.10
, Issue.8
, pp. 1495-1503
-
-
Hwang, Y.S.1
Bang, S.Y.2
-
14
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM 33(2), 168-176 (1990)
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
15
-
-
36249004860
-
-
Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: International Federation for Information Processing-Publications-IFIP, 232, pp. 253-263 (2007)
-
Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: International Federation for Information Processing-Publications-IFIP, vol. 232, pp. 253-263 (2007)
-
-
-
-
18
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies 35(6), 859-870 (1991)
-
(1991)
International Journal of Man-Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
20
-
-
0005322028
-
Optimizing digraph-latency based biometric typist verification systems: Inter and intra typist differences in digraph latency distributions
-
Mahar, D., Napier, R., Wagner, M., Laverty, W., Henderson, R.D., Hiron, M.: Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions. International Journal of Human-Computer Studies 43(4), 579-592 (1995)
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.4
, pp. 579-592
-
-
Mahar, D.1
Napier, R.2
Wagner, M.3
Laverty, W.4
Henderson, R.D.5
Hiron, M.6
-
21
-
-
0031121887
-
-
Man and Cybernatics
-
Obaidat, M.S., Sadoun, B.: Keystroke Dynamics based Authentication Biometrics. Systems, Man and Cybernatics 27(2), 261-269 (1997)
-
(1997)
Keystroke Dynamics based Authentication Biometrics. Systems
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
22
-
-
0029341018
-
A detailed comparison of backpropagation neural network and maximum-likelihood classifiers for urban land use classification
-
Paola, J.D., Schowengerdt, R.: A detailed comparison of backpropagation neural network and maximum-likelihood classifiers for urban land use classification. IEEE Transactions on Geoscience and Remote Sensing 33(4), 981-996 (1995)
-
(1995)
IEEE Transactions on Geoscience and Remote Sensing
, vol.33
, Issue.4
, pp. 981-996
-
-
Paola, J.D.1
Schowengerdt, R.2
-
23
-
-
0030370417
-
Bagging, Boosting, and C4. 5
-
Quinlan, J.R.: Bagging, Boosting, and C4. 5. In: Proceedings of the NCAI, pp. 725-730 (1996)
-
(1996)
Proceedings of the NCAI
, pp. 725-730
-
-
Quinlan, J.R.1
-
25
-
-
72749090100
-
A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones
-
Montreal, Canada. ACM, New York in press
-
Shahzad, M., Zahid, S., Farooq, M.: A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones. In: Proceedings of the 11th annual conference on Genetic and evolutionary computation, Montreal, Canada. ACM, New York (in press, 2009)
-
(2009)
Proceedings of the 11th annual conference on Genetic and evolutionary computation
-
-
Shahzad, M.1
Zahid, S.2
Farooq, M.3
-
26
-
-
0008733341
-
Biometric recognition: Our hands, eyes, and faces give us away
-
Sims, D.: Biometric recognition: our hands, eyes, and faces give us away. IEEE Computer Graphics and Applications 14(5), 14-15 (1994)
-
(1994)
IEEE Computer Graphics and Applications
, vol.14
, Issue.5
, pp. 14-15
-
-
Sims, D.1
-
28
-
-
84944753258
-
An intrusion-tolerant password authentication system
-
Wang, X., Heydari, M.H., Lin, H.: An intrusion-tolerant password authentication system. In: Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pp. 110-118 (2003)
-
(2003)
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
, pp. 110-118
-
-
Wang, X.1
Heydari, M.H.2
Lin, H.3
-
29
-
-
76649113581
-
-
Witten, I.H.: University of Waikato, and Dept. of Computer Science. WEKA Practical Machine Learning Tools and Techniques with Java Implementations. Dept. of Computer Science, University of Waikato (1999)
-
Witten, I.H.: University of Waikato, and Dept. of Computer Science. WEKA Practical Machine Learning Tools and Techniques with Java Implementations. Dept. of Computer Science, University of Waikato (1999)
-
-
-
|