메뉴 건너뛰기




Volumn , Issue , 2007, Pages 7-12

User identification based on game-play activity patterns

Author keywords

Account hijacking; Biometrical signatures; Kullback Leibler divergence; Online games; User behavior

Indexed keywords

ACTIVITY PATTERNS; DETECTION TIME; GAME PLAYERS; GENERAL SOLUTIONS; HUMAN IDENTIFICATION; IDLE TIME DISTRIBUTION; KULLBACK LEIBLER DIVERGENCE; ON-LINE GAMES; SECURITY PROBLEMS; USER BEHAVIORS; USER IDENTIFICATION;

EID: 77953045862     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1326257.1326259     Document Type: Conference Paper
Times cited : (44)

References (18)
  • 2
    • 33747873700 scopus 로고    scopus 로고
    • Game traffic analysis: An MMORPG perspective
    • DOI 10.1016/j.comnet.2005.11.005, PII S1389128605003956
    • K.-T. Chen, P. Huang, and C.-L. Lei. Game traffic analysis: An MMORPG perspective. Computer Networks, 50(16):3002-3023, 2006. (Pubitemid 44292595)
    • (2006) Computer Networks , vol.50 , Issue.16 , pp. 3002-3023
    • Chen, K.-T.1    Huang, P.2    Lei, C.-L.3
  • 4
    • 4344689341 scopus 로고    scopus 로고
    • Demographic factors and playing variables in online computer gaming
    • Aug.
    • M. D. Griffiths, M. N. Davies, and D. Chappell. Demographic factors and playing variables in online computer gaming. CyberPsychology & Behavior, 7(4):479-487, Aug. 2004.
    • (2004) CyberPsychology & Behavior , vol.7 , Issue.4 , pp. 479-487
    • Griffiths, M.D.1    Davies, M.N.2    Chappell, D.3
  • 5
    • 77953073680 scopus 로고
    • Identification by biometrics
    • D. Guinier. Identification by biometrics. SIGSAC Rev., 8(2):1-11, 1990.
    • (1990) SIGSAC Rev. , vol.8 , Issue.2 , pp. 1-11
    • Guinier, D.1
  • 9
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33(2):168-176, 1990.
    • (1990) Commun. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 12
    • 0002322469 scopus 로고
    • On a test of whether one of two random variables is stochastically larger than the other
    • H. B. Mann and D. R. Whitney. On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics, 18:50-60, 1947.
    • (1947) Annals of Mathematical Statistics , vol.18 , pp. 50-60
    • Mann, H.B.1    Whitney, D.R.2
  • 13
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2(5):40-47, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 15
    • 33750039971 scopus 로고    scopus 로고
    • Clustering online game users based on their trails using self-organizing map
    • Sep
    • R. Thawonmas, M. Kurashige, K. Iizuka, and M. Kantardzic. Clustering online game users based on their trails using self-organizing map. In Proceedings of ICEC 2006, pages 366-369, Sep 2006.
    • (2006) Proceedings of ICEC 2006 , pp. 366-369
    • Thawonmas, R.1    Kurashige, M.2    Iizuka, K.3    Kantardzic, M.4
  • 16
    • 68849083729 scopus 로고    scopus 로고
    • Prentice Hall PTR, 1 edition, Sep.
    • J. R. Vacca. Identity Theft. Prentice Hall PTR, 1 edition, Sep. 2002.
    • (2002) Identity Theft
    • Vacca, J.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.