-
2
-
-
33747873700
-
Game traffic analysis: An MMORPG perspective
-
DOI 10.1016/j.comnet.2005.11.005, PII S1389128605003956
-
K.-T. Chen, P. Huang, and C.-L. Lei. Game traffic analysis: An MMORPG perspective. Computer Networks, 50(16):3002-3023, 2006. (Pubitemid 44292595)
-
(2006)
Computer Networks
, vol.50
, Issue.16
, pp. 3002-3023
-
-
Chen, K.-T.1
Huang, P.2
Lei, C.-L.3
-
3
-
-
77953049779
-
Identifying MMORPG bots: A traffic analysis approach
-
K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen. Identifying MMORPG bots: A traffic analysis approach. In Proceedings of ACM SIGCHI ACE'06, Los Angeles, USA, Jun 2006.
-
Proceedings of ACM SIGCHI ACE'06, Los Angeles, USA, Jun 2006
-
-
Chen, K.-T.1
Jiang, J.-W.2
Huang, P.3
Chu, H.-H.4
Lei, C.-L.5
Chen, W.-C.6
-
4
-
-
4344689341
-
Demographic factors and playing variables in online computer gaming
-
Aug.
-
M. D. Griffiths, M. N. Davies, and D. Chappell. Demographic factors and playing variables in online computer gaming. CyberPsychology & Behavior, 7(4):479-487, Aug. 2004.
-
(2004)
CyberPsychology & Behavior
, vol.7
, Issue.4
, pp. 479-487
-
-
Griffiths, M.D.1
Davies, M.N.2
Chappell, D.3
-
5
-
-
77953073680
-
Identification by biometrics
-
D. Guinier. Identification by biometrics. SIGSAC Rev., 8(2):1-11, 1990.
-
(1990)
SIGSAC Rev.
, vol.8
, Issue.2
, pp. 1-11
-
-
Guinier, D.1
-
8
-
-
0742290133
-
An introduction to biometric recognition
-
Jan
-
A. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):4-20, Jan 2004.
-
(2004)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
9
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33(2):168-176, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
12
-
-
0002322469
-
On a test of whether one of two random variables is stochastically larger than the other
-
H. B. Mann and D. R. Whitney. On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics, 18:50-60, 1947.
-
(1947)
Annals of Mathematical Statistics
, vol.18
, pp. 50-60
-
-
Mann, H.B.1
Whitney, D.R.2
-
13
-
-
12844274372
-
Typing patterns: A key to user identification
-
A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2(5):40-47, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
15
-
-
33750039971
-
Clustering online game users based on their trails using self-organizing map
-
Sep
-
R. Thawonmas, M. Kurashige, K. Iizuka, and M. Kantardzic. Clustering online game users based on their trails using self-organizing map. In Proceedings of ICEC 2006, pages 366-369, Sep 2006.
-
(2006)
Proceedings of ICEC 2006
, pp. 366-369
-
-
Thawonmas, R.1
Kurashige, M.2
Iizuka, K.3
Kantardzic, M.4
-
16
-
-
68849083729
-
-
Prentice Hall PTR, 1 edition, Sep.
-
J. R. Vacca. Identity Theft. Prentice Hall PTR, 1 edition, Sep. 2002.
-
(2002)
Identity Theft
-
-
Vacca, J.R.1
-
18
-
-
33749075535
-
Detecting cheaters for multiplayer games: Theory, design and implementation
-
S. Yeung, J. C. Lui, J. Liu, and J. Yan. Detecting cheaters for multiplayer games: Theory, design and implementation. In Proceedings of IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME'06), Las Vegas, USA, Jan 2006.
-
Proceedings of IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME'06), Las Vegas, USA, Jan 2006
-
-
Yeung, S.1
Lui, J.C.2
Liu, J.3
Yan, J.4
|