-
1
-
-
37849008736
-
-
Retrieved on August 2, 2006, from
-
Adler, A., Youmaran, R., & Loyka, S. (2006). Towards a measure of biometric information. Retrieved on August 2, 2006, from http://www.sce.carleton.ca/faculty/adler/publications/2006/youmaran-ccece2006-biometric-entropy.pdf
-
(2006)
Towards a Measure of Biometric Information
-
-
Adler, A.1
Youmaran, R.2
Loyka, S.3
-
2
-
-
84901564399
-
-
June, Paper presented at the Workshop on Information Assurance, United States Military Academy, West Point, NY
-
Ahmed, A. A. E., & Traore, I. (2005a, June). Anomaly intrusion detection based on biometrics. Paper presented at the Workshop on Information Assurance, United States Military Academy, West Point, NY.
-
(2005)
Anomaly Intrusion Detection Based On Biometrics
-
-
Ahmed, A.A.E.1
Traore, I.2
-
3
-
-
84883286001
-
-
October, Paper presented at the Third Annual Conference on Privacy, Security, and Trust, St. Andrews, New Brunswick, Canada
-
Ahmed, A. A. E., & Traore, I. (2005b, October). Detecting computer intrusions using behavioral biometrics. Paper presented at the Third Annual Conference on Privacy, Security, and Trust, St. Andrews, New Brunswick, Canada.
-
(2005)
Detecting Computer Intrusions Using Behavioral Biometrics
-
-
Ahmed, A.A.E.1
Traore, I.2
-
4
-
-
35248886709
-
-
September 10-12, Paper presented at the DAGM, Magdeburg, Germany
-
Al-Zubi, S., Brömme, A., & Tönnies, K. (2003, September 10-12). Using an active shape structural model for biometric sketch recognition. Paper presented at the DAGM, Magdeburg, Germany (pp. 187-195).
-
(2003)
Using An Active Shape Structural Model For Biometric Sketch Recognition
, pp. 187-195
-
-
Al-Zubi, S.1
Brömme, A.2
Tönnies, K.3
-
6
-
-
84901563547
-
-
March 27-30, Paper presented at the First UAE International Conference on Biological and Medical Physics
-
Angle, S., Bhagtani, R., & Chheda, H. (2005, March 27-30). Biometrics: A further echelon of security. Paper presented at the First UAE International Conference on Biological and Medical Physics.
-
(2005)
Biometrics: A Further Echelon of Security
-
-
Angle, S.1
Bhagtani, R.2
Chheda, H.3
-
7
-
-
84901542629
-
-
Paper presented at the Fifth International Symposium on Recent Advances in Intrusion Detection
-
Apap, F., Honig, A., Hershkop, S., Eskin, E., & Stolfo, S. (2002). Detecting malicious software by monitoring anomalous windows registry accesses. Paper presented at the Fifth International Symposium on Recent Advances in Intrusion Detection (pp. 16-18).
-
(2002)
Detecting Malicious Software By Monitoring Anomalous Windows Registry Accesses
, pp. 16-18
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
9
-
-
84876806083
-
-
July-August, Paper presented at the Fifteenth USENIX Security Symposium, Vancouver, BC, Canada
-
Ballard, L., Monrose, F., & Lopresti, D. P. (2006, July-August). Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. Paper presented at the Fifteenth USENIX Security Symposium, Vancouver, BC, Canada.
-
(2006)
Biometric Authentication Revisited: Understanding the Impact of Wolves In Sheep's Clothing
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.P.3
-
11
-
-
60749096615
-
-
Paper presented at the MLMTA
-
Bartolacci, G., Curtin, M., Katzenberg, M., Nwana, N., Cha, S.-H., & Tappert, C. C. (2005). Long-text keystroke biometric applications over the Internet. Paper presented at the MLMTA (pp. 119-126).
-
(2005)
Long-text Keystroke Biometric Applications Over the Internet
, pp. 119-126
-
-
Bartolacci, G.1
Curtin, M.2
Katzenberg, M.3
Nwana, N.4
Cha, S.-H.5
Tappert, C.C.6
-
12
-
-
84901551283
-
Personal identifiers in musicians' finger movement dynamics
-
{black small square}{black small square}{black small square}
-
Bella, S. D., & Palmer, C. (2006). Personal identifiers in musicians' finger movement dynamics. Journal of Cognitive Neuroscience, {black small square}{black small square}{black small square}, 18.
-
(2006)
Journal of Cognitive Neuroscience
, vol.18
-
-
Bella, S.D.1
Palmer, C.2
-
14
-
-
78650165017
-
User authentication through keystroke dynamics
-
[TISSEC], doi:10.1145/581271.581272
-
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. [TISSEC]. ACM Transactions on Information and System Security, 5(4), 367-397. doi:10.1145/581271.581272
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
15
-
-
33751039507
-
-
May, Paper presented at the IEEE Symposium on Security and Privacy
-
Bhatkar, S., Chaturvedi, A., & Sekar, R. (2006, May). Dataflow anomaly detection. Paper presented at the IEEE Symposium on Security and Privacy.
-
(2006)
Dataflow Anomaly Detection
-
-
Bhatkar, S.1
Chaturvedi, A.2
Sekar, R.3
-
16
-
-
84901533884
-
-
Bioprivacy.org, Retrieved on July 22, 2005, from
-
Bioprivacy.org. (2005a). FAQ. BioPrivacy Initiative. Retrieved on July 22, 2005, from http://www.bioprivacy.org/faqmain.htm
-
(2005)
FAQ. BioPrivacy Initiative
-
-
-
17
-
-
37349014618
-
-
Bioprivacy.org, International Biometric Group, LLC. Retrieved on October 2, 2005, from
-
Bioprivacy.org. (2005b). FAQ's and definitions. International Biometric Group, LLC. Retrieved on October 2, 2005, from http://www.bioprivacy.org/bioprivacy_text.htm
-
(2005)
FAQ's and Definitions
-
-
-
18
-
-
10044297649
-
-
New York, Springer
-
Bolle, R., Connell, J., Pankanti, S., Ratha, N., & Senior, A. (2003). Guide to biometrics. New York: Springer.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
20
-
-
84901512703
-
-
July 6-9, Paper presented at the International Conference on Multimedia and Expo (ICME '03)
-
Bromme, A. (2003, July 6-9). A classification of biometric signatures. Paper presented at the International Conference on Multimedia and Expo (ICME '03) (pp. 17-20).
-
(2003)
A Classification of Biometric Signatures
, pp. 17-20
-
-
Bromme, A.1
-
21
-
-
85135199625
-
-
July 24, Paper presented at the BIOSIG, Darmstadt, Germany
-
Brömme, A., & Al-Zubi, S. (2003, July 24). Multifactor biometric sketch authentication. Paper presented at the BIOSIG, Darmstadt, Germany (pp. 81-90).
-
(2003)
Multifactor Biometric Sketch Authentication
, pp. 81-90
-
-
Brömme, A.1
Al-Zubi, S.2
-
22
-
-
0036298115
-
Automatic speechreading with applications to speaker verification
-
Broun, C. C., Zhang, X., Mersereau, R. M., & Clements, M.A. (2002). Automatic speechreading with applications to speaker verification. Eurasip Journal on Applied Signal Processing, Special Issue on Joint Audio-Visual Speech Processing.
-
(2002)
Eurasip Journal On Applied Signal Processing, Special Issue On Joint Audio-Visual Speech Processing
-
-
Broun, C.C.1
Zhang, X.2
Mersereau, R.M.3
Clements, M.A.4
-
23
-
-
0013164114
-
-
(Tech. Rep.), Bell Labs, Lucent Technologies
-
Cahill, M., Lambert, D., Pinheiro, J., & Sun, D. (2000). Detecting fraud in the real world. (Tech. Rep.). Bell Labs, Lucent Technologies.
-
(2000)
Detecting Fraud In the Real World
-
-
Cahill, M.1
Lambert, D.2
Pinheiro, J.3
Sun, D.4
-
24
-
-
0031233424
-
Speaker recognition: A tutorial
-
doi:10.1109/5.628714
-
Campbell, J. P. (1997). Speaker recognition: A tutorial. Proceedings of the IEEE, 85(9), 1437-1462. doi:10.1109/5.628714
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1437-1462
-
-
Campbell, J.P.1
-
25
-
-
33644816032
-
Performance evaluation of fingerprint verification systems
-
doi:10.1109/TPAMI.2006.20
-
Cappelli, R., Maio, D., Maltoni, D., Wayman, J. L., & Jain, A. K. (2006). Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(1), 3-18. doi:10.1109/TPAMI.2006.20
-
(2006)
IEEE Transactions On Pattern Analysis and Machine Intelligence
, vol.28
, Issue.1
, pp. 3-18
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
Wayman, J.L.4
Jain, A.K.5
-
26
-
-
84947880300
-
-
Caslon.com.au, Retrieved on October 2, 2005, from
-
Caslon.com.au. (2005). Caslon-analytics. Retrieved on October 2, 2005, from http://www.caslon.com.au/biometricsnote8.htm
-
(2005)
Caslon-analytics
-
-
-
27
-
-
15744379565
-
-
October 10-13, Paper presented at the IEEE International Conference on Systems, Man and Cybernetics
-
Ciota, Z. (2004, October 10-13). Speaker verification for multimedia application. Paper presented at the IEEE International Conference on Systems, Man and Cybernetics (pp. 2752-2756).
-
(2004)
Speaker Verification For Multimedia Application
, pp. 2752-2756
-
-
Ciota, Z.1
-
28
-
-
0029762782
-
-
Paper presented at the IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, GA
-
Colombi, J., Ruck, D., Rogers, S., Oxley, M., & Anderson, T. (1996). Cohort selection and word grammar effects for speaker recognition. Paper presented at the IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, GA (pp. 85-88).
-
(1996)
Cohort Selection and Word Grammar Effects For Speaker Recognition
, pp. 85-88
-
-
Colombi, J.1
Ruck, D.2
Rogers, S.3
Oxley, M.4
Anderson, T.5
-
30
-
-
84901560772
-
-
June, Paper presented at the Workshop Sci Comp/Comp Stat (IWSCCS 2006), Hong Kong
-
Curtin, M., Tappert, C. C., Villani, M., Ngo, G., Simone, J., Fort, H. S., et al. (2006, June). Keystroke biometric recognition on long-text input: A feasibility study. Paper presented at the Workshop Sci Comp/Comp Stat (IWSCCS 2006), Hong Kong.
-
(2006)
Keystroke Biometric Recognition On Long-text Input: A Feasibility Study
-
-
Curtin, M.1
Tappert, C.C.2
Villani, M.3
Ngo, G.4
Simone, J.5
Fort, H.S.6
-
31
-
-
77950162284
-
-
June 18-20, Paper presented at the IEEE Information Assurance Workshop on Systems, Man, and Cybernetics Society
-
Dahel, S. K., & Xiao, Q. (2003, June 18-20). Accuracy performance analysis of multimodal biometrics. Paper presented at the IEEE Information Assurance Workshop on Systems, Man, and Cybernetics Society (pp. 170-173).
-
(2003)
Accuracy Performance Analysis of Multimodal Biometrics
, pp. 170-173
-
-
Dahel, S.K.1
Xiao, Q.2
-
32
-
-
84901515851
-
-
December 11-15, Paper presented at the International ICSC Conference on Intelligent Systems and Applications, University of Wollongong Australia
-
Dao, V., & Vemuri, V. (2000, December 11-15). Profiling users in the UNIX OS environment. Paper presented at the International ICSC Conference on Intelligent Systems and Applications, University of Wollongong Australia.
-
(2000)
Profiling Users In the UNIX OS Environment
-
-
Dao, V.1
Vemuri, V.2
-
35
-
-
0023294428
-
An intrusion-detection model
-
doi:10.1109/TSE.1987.232894
-
Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 222-232. doi:10.1109/TSE.1987.232894
-
(1987)
IEEE Transactions On Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
36
-
-
33750965925
-
-
October 17-18, Paper presented at the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
-
Deshpande, S., Chikkerur, S., & Govindaraju, V. (2005, October 17-18). Accent classification in speech. Paper presented at the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (pp. 139-143).
-
(2005)
Accent Classification In Speech
, pp. 139-143
-
-
Deshpande, S.1
Chikkerur, S.2
Govindaraju, V.3
-
37
-
-
0036288549
-
-
May, Paper presented at the IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), Special Session on Biometrics, Orlando, FL
-
Dugelay, J.-L., Junqua, J.-C., Kotropoulos, C., Kuhn, R., Perronnin, F., & Pitas, I. (2002, May). Recent advances in biometric person authentication. Paper presented at the IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), Special Session on Biometrics, Orlando, FL.
-
(2002)
Recent Advances In Biometric Person Authentication
-
-
Dugelay, J.-L.1
Junqua, J.-C.2
Kotropoulos, C.3
Kuhn, R.4
Perronnin, F.5
Pitas, I.6
-
38
-
-
33744974361
-
-
Retrieved on October 6, 2005, from
-
Elissetche, M. M. (2005). Social science dictionary. Retrieved on October 6, 2005, from http://www.elissetche.org/dico/p.htm
-
(2005)
Social Science Dictionary
-
-
Elissetche, M.M.1
-
39
-
-
26444499551
-
Multimodal person recognition for vehicular applications
-
Erdogan, H., Ercil, A., Ekenel, H., Bilgin, S., Eden, I., & Kirisci, M. (2005a). Multimodal person recognition for vehicular applications. LNCS, 3541, 366-375.
-
(2005)
LNCS
, vol.3541
, pp. 366-375
-
-
Erdogan, H.1
Ercil, A.2
Ekenel, H.3
Bilgin, S.4
Eden, I.5
Kirisci, M.6
-
40
-
-
56749120603
-
-
September, Paper presented at the Biennial on DSP for in-vehicle and mobile systems, Sesimbra, Portugal
-
Erdogan, H., Ozyagci, A. N., Eskil, T., Rodoper, M., Ercil, A., & Abut, H. (2005b, September). Experiments on decision fusion for driver recognition. Paper presented at the Biennial on DSP for in-vehicle and mobile systems, Sesimbra, Portugal.
-
(2005)
Experiments On Decision Fusion For Driver Recognition
-
-
Erdogan, H.1
Ozyagci, A.N.2
Eskil, T.3
Rodoper, M.4
Ercil, A.5
Abut, H.6
-
41
-
-
33646007315
-
Multimodal person recognition for human-vehicle interaction
-
doi:10.1109/MMUL.2006.37
-
Erzin, E., Yemez, Y., Tekalp, A. M., Erçil, A., Erdogan, H., & Abut, H. (2006). Multimodal person recognition for human-vehicle interaction. IEEE MultiMedia, 13, 18-31. doi:10.1109/MMUL.2006.37
-
(2006)
IEEE MultiMedia
, vol.13
, pp. 18-31
-
-
Erzin, E.1
Yemez, Y.2
Tekalp, A.M.3
Erçil, A.4
Erdogan, H.5
Abut, H.6
-
42
-
-
0013113240
-
Adaptive fraud detection
-
doi:10.1023/A:1009700419189
-
Fawcett, T., & Provost, F. (1997). Adaptive fraud detection. Data Mining and Knowledge Discovery, 1(3), 291-316. doi:10.1023/A:1009700419189
-
(1997)
Data Mining and Knowledge Discovery
, vol.1
, Issue.3
, pp. 291-316
-
-
Fawcett, T.1
Provost, F.2
-
43
-
-
70349100099
-
-
May 11-14, Paper presented at the IEEE Security and Privacy, Oakland, CA
-
Feng, H., Kolesnikov, O., Fogla, P., Lee, W., & Gong, W. (2003a, May 11-14). Anomaly detection using call stack information. Paper presented at the IEEE Security and Privacy, Oakland, CA.
-
(2003)
Anomaly Detection Using Call Stack Information
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
44
-
-
0038825045
-
-
Paper presented at the IEEE Symposium on Security and Privacy
-
Feng, H. H., Kolesnikov, O. M., Fogla, P., Lee, W., & Gong, W. (2003b). Anomaly detection using call stack information. Paper presented at the IEEE Symposium on Security and Privacy (pp. 62-78).
-
(2003)
Anomaly Detection Using Call Stack Information
, pp. 62-78
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
46
-
-
84901517773
-
-
June, Paper presented at the International Conference on Internet Computing (IC'2002), Las Vegas, NV
-
Fu, Y., & Shih, M. (2002, June). A framework for personal Web usage mining. Paper presented at the International Conference on Internet Computing (IC'2002), Las Vegas, NV (pp. 595-600).
-
(2002)
A Framework For Personal Web Usage Mining
, pp. 595-600
-
-
Fu, Y.1
Shih, M.2
-
52
-
-
0033686360
-
-
Paper presented at the International Conference on Intelligent User Interfaces, New Orleans, LA
-
Goecks, J., & Shavlik, J. (2000). Learning users' interests by unobtrusively observing their normal behavior. Paper presented at the International Conference on Intelligent User Interfaces, New Orleans, LA (pp. 129-132).
-
(2000)
Learning Users' Interests By Unobtrusively Observing their Normal Behavior
, pp. 129-132
-
-
Goecks, J.1
Shavlik, J.2
-
53
-
-
34548122028
-
User profiling for intrusion detection in windows NT
-
Goldring, T. (2003). User profiling for intrusion detection in windows NT. Computing Science and Statistics, 35.
-
(2003)
Computing Science and Statistics
, vol.35
-
-
Goldring, T.1
-
55
-
-
27144437024
-
-
(Tech. Rep. CMUPDL-03-106). Carnegie Mellon University
-
Griffin, J. L., Pennington, A. G., Bucy, J. S., Choundappan, D., Muralidharan, N., & Ganger, G. R. (2003). On the feasibility of intrusion detection inside workstation disks. (Tech. Rep. CMUPDL-03-106). Carnegie Mellon University.
-
(2003)
On the Feasibility of Intrusion Detection Inside Workstation Disks
-
-
Griffin, J.L.1
Pennington, A.G.2
Bucy, J.S.3
Choundappan, D.4
Muralidharan, N.5
Ganger, G.R.6
-
56
-
-
26944496794
-
-
(LNAI, pp. 613-615)
-
Grosser, H., Britos, H., & García-Martínez, R. (2005). Detecting fraud in mobile telephony using neural networks. (LNAI, pp. 613-615).
-
(2005)
Detecting Fraud In Mobile Telephony Using Neural Networks
-
-
Grosser, H.1
Britos, H.2
García-Martínez, R.3
-
57
-
-
33745198933
-
-
Paper presented at the Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Madrid, Spain
-
Gunetti, D., Picardi, C., & Ruffo, G. (2005). Keystroke analysis of different languages: A case study. Paper presented at the Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Madrid, Spain (pp. 133-144).
-
(2005)
Keystroke Analysis of Different Languages: A Case Study
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
58
-
-
37349092111
-
Digital forensic analysis of e-mails: A trusted e-mail protocol
-
Gupta, G., Mazumdar, C., & Rao, M. S. (2004). Digital forensic analysis of e-mails: A trusted e-mail protocol. International Journal of Digital Evidance, 2(4).
-
(2004)
International Journal of Digital Evidance
, vol.2
, Issue.4
-
-
Gupta, G.1
Mazumdar, C.2
Rao, M.S.3
-
60
-
-
84901516302
-
-
rd IEEE Benelux Signal Processing Symp. (SPS), Leuven, Belgium
-
rd IEEE Benelux Signal Processing Symp. (SPS), Leuven, Belgium (pp. 241-244).
-
(2002)
Sensing Pressure For Authentication
, pp. 241-244
-
-
Henderson, N.J.1
White, N.M.2
Veldhuis, R.N.J.3
Hartel, P.H.4
Slump, C.H.5
-
61
-
-
84901572199
-
-
Paper presented at the Sensors and Their Applications XI
-
Henderson, N. Y., Papakostas, T. V., White, N. M., & Hartel, P. H. (2001). Polymer thick-film sensors: Possibilities for smartcard biometrics. Paper presented at the Sensors and Their Applications XI (pp. 83-88).
-
(2001)
Polymer Thick-film Sensors: Possibilities For Smartcard Biometrics
, pp. 83-88
-
-
Henderson, N.Y.1
Papakostas, T.V.2
White, N.M.3
Hartel, P.H.4
-
64
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S. A., Forrest, S., & Somayaji, A. (1998). Intrusion detection using sequences of system calls. Journal of Computer Security, 6, 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
66
-
-
11244328196
-
-
Paper presented at the Proc. 2004 IEEE International Conference on Multimedia and Expo
-
Igarashi, K., Miyajima, C., Itou, K., Takeda, K., Itakura, F., & Abut, H. (2004). Biometric identification using driving behavioral signals. Paper presented at the Proc. 2004 IEEE International Conference on Multimedia and Expo (pp. 65-68).
-
(2004)
Biometric Identification Using Driving Behavioral Signals
, pp. 65-68
-
-
Igarashi, K.1
Miyajima, C.2
Itou, K.3
Takeda, K.4
Itakura, F.5
Abut, H.6
-
67
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R.A., & Porras, P.A. (1995). State transition analysis: A rule-based intrusion detection approach. Software Engineering, 21(3), 181-199.
-
(1995)
Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
68
-
-
34147151570
-
-
Retrieved on July 12, 2006, from
-
Ilonen, J. (2006). Keystroke dynamics. Retrieved on July 12, 2006, from www.it.lut.fi/kurssit/03-04/010970000/seminars/ilonen.pdf
-
(2006)
Keystroke Dynamics
-
-
Ilonen, J.1
-
69
-
-
33745159644
-
-
Paper presented at the International Conference on Cyberworlds
-
Ito, A., Wang, X., Suzuki, M., & Makino, S. (2005). Smile and laughter recognition using speech processing and face recognition from conversation video. Paper presented at the International Conference on Cyberworlds (pp. 437-444).
-
(2005)
Smile and Laughter Recognition Using Speech Processing and Face Recognition From Conversation Video
, pp. 437-444
-
-
Ito, A.1
Wang, X.2
Suzuki, M.3
Makino, S.4
-
70
-
-
84877970764
-
-
Paper presented at the Education Next Retrieved from
-
Jacob, B. A., & Levitt, S. D. (2004). To catch a cheat. Paper presented at the Education Next Retrieved from www.educationnext.org
-
(2004)
To Catch a Cheat
-
-
Jacob, B.A.1
Levitt, S.D.2
-
71
-
-
0036887670
-
Online signature verification
-
doi:10.1016/S0031-3203(01)002400
-
Jain, A., Griess, F., & Connell, S. (2002). Online signature verification. Pattern Recognition, 35, 2963-2972. doi:10.1016/S0031-3203(01)002400
-
(2002)
Pattern Recognition
, vol.35
, pp. 2963-2972
-
-
Jain, A.1
Griess, F.2
Connell, S.3
-
72
-
-
0003987134
-
-
Norwell, MA, Kluwer Academic Publishers
-
Jain, A. K., Bolle, R., & Pankanti, S. (1999). BIOMETRICS: Personal identification in networked society. Norwell, MA: Kluwer Academic Publishers.
-
(1999)
BIOMETRICS: Personal Identification In Networked Society
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
73
-
-
8844259623
-
-
Paper presented at the SPIE Defense and Security Symposium, Orlando, FL, April 2004
-
Jain, A. K., Dass, S. C., & Nandakumar, K. (2004a). Can soft biometric traits assist user recognition? Paper presented at the SPIE Defense and Security Symposium, Orlando, FL, April 2004.
-
(2004)
Can Soft Biometric Traits Assist User Recognition?
-
-
Jain, A.K.1
Dass, S.C.2
Nandakumar, K.3
-
74
-
-
33646138841
-
-
July, Paper presented at the International Conference on Biometric Authentication (ICBA), Hong Kong
-
Jain, A. K., Dass, S. C., & Nandakumar, K. (2004b, July). Soft biometric traits for personal recognition systems. Paper presented at the International Conference on Biometric Authentication (ICBA), Hong Kong (pp. 731-738).
-
(2004)
Soft Biometric Traits For Personal Recognition Systems
, pp. 731-738
-
-
Jain, A.K.1
Dass, S.C.2
Nandakumar, K.3
-
75
-
-
10044236375
-
-
August, Paper presented at the International Conference on Pattern Recognition, Cambridge, UK
-
Jain, A. K., Pankanti, S., Prabhakar, S., Hong, L., & Ross, A. (2004c, August). Biometrics: A grand challenge. Paper presented at the International Conference on Pattern Recognition, Cambridge, UK.
-
(2004)
Biometrics: A Grand Challenge
-
-
Jain, A.K.1
Pankanti, S.2
Prabhakar, S.3
Hong, L.4
Ross, A.5
-
76
-
-
0742290133
-
An introduction to biometric recognition
-
doi:10.1109/TCSVT.2003.818349
-
Jain, A. K., Ross, A., & Prabhakar, S. (2004d). An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol, 14, 4-20. doi:10.1109/TCSVT.2003.818349
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
77
-
-
25144471298
-
Score normalization in multimodal biometric systems
-
doi:10.1016/j.patcog.2005.01.012
-
Jain, K., Nandakumar, K., & Ross, A. (2005). Score normalization in multimodal biometric systems. Pattern Recognition, 38(12), 2270-2285. doi:10.1016/j.patcog.2005.01.012
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2270-2285
-
-
Jain, K.1
Nandakumar, K.2
Ross, A.3
-
80
-
-
0031220766
-
Acoustic-labial speaker verification
-
doi:10.1016/S0167-8655(97)00070-6
-
Jourlin, P., Luettin, J., Genoud, D., & Wassner, H. (1997). Acoustic-labial speaker verification. Pattern Recognition Letters, 18(9), 853-858. doi:10.1016/S0167-8655(97)00070-6
-
(1997)
Pattern Recognition Letters
, vol.18
, Issue.9
, pp. 853-858
-
-
Jourlin, P.1
Luettin, J.2
Genoud, D.3
Wassner, H.4
-
82
-
-
4344637549
-
Identification of humans using gait
-
doi:10.1109/TIP.2004.832865
-
Kale, A., Sundaresan, A., Rajagopalan, A. N., & Cuntoor, N., RoyChowdhury, A.,Kruger, V., et al. (2004). Identification of humans using gait. IEEE Transactions on Image Processing, 13(9). doi:10.1109/TIP.2004.832865
-
(2004)
IEEE Transactions On Image Processing
, vol.13
, Issue.9
-
-
Kale, A.1
Sundaresan, A.2
Rajagopalan, A.N.3
Cuntoor, N.4
Roychowdhury, A.5
Kruger, V.6
-
84
-
-
84901521483
-
-
th Annual Workshop on Circuits, Systems, and Signal Processing (ProRISC), Veldhoven, The Netherlands
-
th Annual Workshop on Circuits, Systems, and Signal Processing (ProRISC), Veldhoven, The Netherlands (pp. 379-384).
-
(2003)
Grip-pattern Recognition For Smart Guns
, pp. 379-384
-
-
Kauffman, J.A.1
Bazen, A.M.2
Gerez, S.H.3
Veldhuis, R.N.J.4
-
85
-
-
78651566234
-
-
(No. MLI 03-2). Fairfax, VA, George Mason University
-
Kaufman, K., Cervone, G., & Michalski, R. S. (2003). An application of symbolic learning to intrusion detection: Preliminary results from the LUS methodology (No. MLI 03-2). Fairfax, VA: George Mason University.
-
(2003)
An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology
-
-
Kaufman, K.1
Cervone, G.2
Michalski, R.S.3
-
86
-
-
33750798519
-
-
April, Paper presented at the IEEE ITNG 2006, Internet and Wireless Network Security Track, Las Vegas, NV
-
Kim, Y., Jo, J.-Y., & Suh, K. (2006, April). Baseline profile stability for network anomaly detection. Paper presented at the IEEE ITNG 2006, Internet and Wireless Network Security Track, Las Vegas, NV.
-
(2006)
Baseline Profile Stability For Network Anomaly Detection
-
-
Kim, Y.1
Jo, J.-Y.2
Suh, K.3
-
89
-
-
84901548938
-
-
January, Paper presented at the Eighth International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, FL
-
Koppel, M., Schler, J., & Mughaz, D. (2004, January). Text categorization for authorship verification. Paper presented at the Eighth International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, FL.
-
(2004)
Text Categorization For Authorship Verification
-
-
Koppel, M.1
Schler, J.2
Mughaz, D.3
-
90
-
-
33646244129
-
-
Retrieved on October 12, 2008, from
-
Korotkaya, Z. (2003). Biometrics person authentication: Odor. Retrieved on October 12, 2008, from http://www.it.lut.fi/kurssit/03-04/010970000/seminars/korotkaya.pdf
-
(2003)
Biometrics Person Authentication: Odor
-
-
Korotkaya, Z.1
-
91
-
-
84901567712
-
-
Paper presented at the Workshop: Machine Learning in New Information Age, Barcelona, Spain
-
Koychev, I., & Schwab, I. (2000). Adaptation to drifting user's interests. Paper presented at the Workshop: Machine Learning in New Information Age, Barcelona, Spain.
-
(2000)
Adaptation to Drifting User's Interests
-
-
Koychev, I.1
Schwab, I.2
-
93
-
-
33845567238
-
-
June, Paper presented at the International Conference on Dependable Systems and Networks (DSN 2006)
-
Lam, L.-C., Li, W., & Chiueh, T.-C. (2006, June). Accurate and automated system call policy-based intrusion prevention. Paper presented at the International Conference on Dependable Systems and Networks (DSN 2006).
-
(2006)
Accurate and Automated System Call Policy-based Intrusion Prevention
-
-
Lam, L.-C.1
Li, W.2
Chiueh, T.-C.3
-
97
-
-
0242323507
-
A new similarity measure based on intraclass statistics for biometric systems
-
doi:10.4218/etrij.03.0102.0017
-
Lee, K., & Park, H. (2003). A new similarity measure based on intraclass statistics for biometric systems. ETRI Journal, 25(5), 401-406. doi:10.4218/etrij.03.0102.0017
-
(2003)
ETRI Journal
, vol.25
, Issue.5
, pp. 401-406
-
-
Lee, K.1
Park, H.2
-
98
-
-
84940104123
-
-
Paper presented at the IEEE Symposium on Security and Privacy, Oakland, CA
-
Lee, W., Stolfo, S. J., & Mok, K. W. (1999). A data mining framework for building intrusion detection models. Paper presented at the IEEE Symposium on Security and Privacy, Oakland, CA.
-
(1999)
A Data Mining Framework For Building Intrusion Detection Models
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
100
-
-
0036095845
-
-
Paper presented at the Journal of Computer Security
-
Li, Y., Wu, N., Jajodia, S., & Wang, X. S. (2002). Enhancing profiles for anomaly detection using time granularities. Paper presented at the Journal of Computer Security (pp. 137-157).
-
(2002)
Enhancing Profiles For Anomaly Detection Using Time Granularities
, pp. 137-157
-
-
Li, Y.1
Wu, N.2
Jajodia, S.3
Wang, X.S.4
-
102
-
-
21644484352
-
-
November 7-10, Paper presented at the Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers
-
Lin, X., & Simske, S. (2004, November 7-10). Phoneme-less hierarchical accent classification. Paper presented at the Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers (pp. 1801-1804).
-
(2004)
Phoneme-less Hierarchical Accent Classification
, pp. 1801-1804
-
-
Lin, X.1
Simske, S.2
-
105
-
-
24744457752
-
-
April 4-6, Paper presented at the International Conference on Information Technology: Coding and Computing (ITCC 2005)
-
Liu, Z., & Bridges, S. M. (2005, April 4-6). Dynamic learning of automata from the call stack log for anomaly detection. Paper presented at the International Conference on Information Technology: Coding and Computing (ITCC 2005) (pp. 774-779).
-
(2005)
Dynamic Learning of Automata From the Call Stack Log For Anomaly Detection
, pp. 774-779
-
-
Liu, Z.1
Bridges, S.M.2
-
107
-
-
84901511134
-
-
Paper presented at the Conference on Auditing and Computer Technology
-
Lunt, T. (1993). Detecting intruders in computer systems. Paper presented at the Conference on Auditing and Computer Technology.
-
(1993)
Detecting Intruders In Computer Systems
-
-
Lunt, T.1
-
108
-
-
10344226218
-
A digital technique for art authentication
-
Lyu, S., Rockmore, D., & Farid, H. (2004). A digital technique for art authentication. National Academy of Sciences, 101(49), 17006-17010.
-
(2004)
National Academy of Sciences
, vol.101
, Issue.49
, pp. 17006-17010
-
-
Lyu, S.1
Rockmore, D.2
Farid, H.3
-
109
-
-
84901513294
-
-
Retrieved on July 28, 2006, from
-
Mainguet, J.-F. (2006). Biometrics, Retrieved on July 28, 2006, from http://perso.orange.fr/fingerchip/biometrics/biometrics.htm
-
(2006)
Biometrics
-
-
Mainguet, J.-F.1
-
111
-
-
33947505230
-
Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation
-
doi:10.1109/TPAMI.2007.1012
-
Marcel, S., & Millan, J. (2007). Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4), 743-752. doi:10.1109/TPAMI.2007.1012
-
(2007)
IEEE Transactions On Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 743-752
-
-
Marcel, S.1
Millan, J.2
-
113
-
-
84901562267
-
-
Paper presented at the In IEEE Workshop, MMSP
-
Mason, J. S. D., Brand, J., Auckenthaler, R., Deravi, F., & Chibelushi, C. (1999). Lip signatures for automatic person recognition. Paper presented at the In IEEE Workshop, MMSP (pp. 457-462).
-
(1999)
Lip Signatures For Automatic Person Recognition
, pp. 457-462
-
-
Mason, J.S.D.1
Brand, J.2
Auckenthaler, R.3
Deravi, F.4
Chibelushi, C.5
-
114
-
-
0036931591
-
-
June 23-26, Paper presented at the International Conference of Dependable Systems and Networks, Washington, D.C
-
Maxion, R. A., & Townsend, T. N. (2002a, June 23-26). Masquerade detection using truncated command lines. Paper presented at the International Conference of Dependable Systems and Networks, Washington, D.C.
-
(2002)
Masquerade Detection Using Truncated Command Lines
-
-
Maxion, R.A.1
Townsend, T.N.2
-
117
-
-
84901533575
-
-
October, Paper presented at the Third International Workshop in Recent Advances in Intrusion Detection, Toulouse, France
-
Michael, C. C., & Ghosh, A. (2000, October). Using finite automata to mine execution data for intrusion detection: A preliminary report. Paper presented at the Third International Workshop in Recent Advances in Intrusion Detection, Toulouse, France.
-
(2000)
Using Finite Automata to Mine Execution Data For Intrusion Detection: A Preliminary Report
-
-
Michael, C.C.1
Ghosh, A.2
-
118
-
-
63649110860
-
-
Paper presented at the World Academy of Science, Engineering and Technology
-
Mohammadi, G., Shoushtari, P., Ardekani, B. M., & Shamsollahi, M. B. (2006). Person identification by using AR model for EEG signals. Paper presented at the World Academy of Science, Engineering and Technology.
-
(2006)
Person Identification By Using AR Model For EEG Signals
-
-
Mohammadi, G.1
Shoushtari, P.2
Ardekani, B.M.3
Shamsollahi, M.B.4
-
119
-
-
20444450590
-
-
October 24-27, Paper presented at the International Conference on Image Processing
-
Mok, L., Lau, W. H., Leung, S. H., Wang, S. L., & Yan, H. (2004, October 24-27). Person authentication using ASM based lip shape and intensity information. Paper presented at the International Conference on Image Processing (pp. 561-564).
-
(2004)
Person Authentication Using ASM Based Lip Shape and Intensity Information
, pp. 561-564
-
-
Mok, L.1
Lau, W.H.2
Leung, S.H.3
Wang, S.L.4
Yan, H.5
-
121
-
-
84901567535
-
-
June 2-4, Paper presented at the Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI'2004), Miami, FL
-
Muralidharan, N., & Wunnava, S. (2004, June 2-4). Signature verification: A popular biometric technology. Paper presented at the Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI'2004), Miami, FL.
-
(2004)
Signature Verification: A Popular Biometric Technology
-
-
Muralidharan, N.1
Wunnava, S.2
-
122
-
-
0031070158
-
Automatic online signature verification
-
doi:10.1109/5.554220
-
Nalwa, V. S. (1997). Automatic online signature verification. Proceedings of the IEEE, 85, 215-239. doi:10.1109/5.554220
-
(1997)
Proceedings of the IEEE
, vol.85
, pp. 215-239
-
-
Nalwa, V.S.1
-
123
-
-
84946410215
-
-
June 18-20, Paper presented at the IEEE Systems, Man, and Cybernetics Society Information Assurance Workshop
-
Nguyen, N., Reiher, P., & Kuenning, G. H. (2003, June 18-20). Detecting insider threats by monitoring system call activity. Paper presented at the IEEE Systems, Man, and Cybernetics Society Information Assurance Workshop (pp. 45-52).
-
(2003)
Detecting Insider Threats By Monitoring System Call Activity
, pp. 45-52
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
125
-
-
33747630166
-
-
Unpublished MS thesis, Rochester Institute of Technology, Rochester, NY
-
Novikov, D. (2005). Neural networks to intrusion detection. Unpublished MS thesis, Rochester Institute of Technology, Rochester, NY.
-
(2005)
Neural Networks to Intrusion Detection
-
-
Novikov, D.1
-
126
-
-
33750804406
-
-
April 10-12, Paper presented at the Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, NV
-
Novikov, D., Yampolskiy, R. V., & Reznik, L. (2006a, April 10-12). Anomaly detection based intrusion detection. Paper presented at the Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, NV (pp. 420-425).
-
(2006)
Anomaly Detection Based Intrusion Detection
, pp. 420-425
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
127
-
-
47849130842
-
-
May 5, Paper presented at the Long Island Systems Applications and Technology Conference (LISAT2006), Long Island, NY
-
Novikov, D., Yampolskiy, R. V., & Reznik, L. (2006b, May 5). Artificial intelligence approaches for intrusion detection. Paper presented at the Long Island Systems Applications and Technology Conference (LISAT2006), Long Island, NY (pp. 1-8).
-
(2006)
Artificial Intelligence Approaches For Intrusion Detection
, pp. 1-8
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
129
-
-
33845498470
-
-
May 17-19, Paper presented at the IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada
-
Orozco, M., Asfaw, Y., Adler, A., Shirmohammadi, S., & Saddik, A. E. (2005, May 17-19). Automatic identification of participants in haptic systems. Paper presented at the IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada.
-
(2005)
Automatic Identification of Participants In Haptic Systems
-
-
Orozco, M.1
Asfaw, Y.2
Adler, A.3
Shirmohammadi, S.4
Saddik, A.E.5
-
130
-
-
33750122385
-
-
March 25-29, Paper presented at the IEEE Virtual Reality Conference, Alexandria, VA
-
Orozco, M., Asfaw, Y., Shirmohammadi, S., Adler, A., & Saddik, A. E. (2006, March 25-29). Haptic-based biometrics: A feasibility study. Paper presented at the IEEE Virtual Reality Conference, Alexandria, VA.
-
(2006)
Haptic-based Biometrics: A Feasibility Study
-
-
Orozco, M.1
Asfaw, Y.2
Shirmohammadi, S.3
Adler, A.4
Saddik, A.E.5
-
131
-
-
58349109834
-
-
July, Paper presented at the Audio- and Video-based Biometric Person Authentication, AVBPA, New York
-
Pamudurthy, S., Guan, E., Mueller, K., & Rafailovich, M. (2005, July). Dynamic approach for face recognition using digital image skin correlation. Paper presented at the Audio- and Video-based Biometric Person Authentication (AVBPA), New York.
-
(2005)
Dynamic Approach For Face Recognition Using Digital Image Skin Correlation
-
-
Pamudurthy, S.1
Guan, E.2
Mueller, K.3
Rafailovich, M.4
-
132
-
-
84901516936
-
-
Paper presented at the IEEE International Conference on Multimedia and Expo (ICME '02)
-
Paper presented at the IEEE International Conference on Multimedia and Expo (ICME '02) (pp. 573-576).
-
-
-
-
133
-
-
34548114499
-
-
(No. CMU--CS-02-179). Carnegie Mellon University
-
Pennington, A. G., Strunk, J. D., Griffin, J. L., Soules, C. A. N., Goodson, G. R., & Ganger, G. R. (2002). Storage-based intrusion detection: Watching storage activity for suspicious behavior. (No. CMU--CS-02-179). Carnegie Mellon University.
-
(2002)
Storage-based Intrusion Detection: Watching Storage Activity For Suspicious Behavior
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.N.4
Goodson, G.R.5
Ganger, G.R.6
-
134
-
-
84901526331
-
-
Paper presented at the Second International Workshop on Multimodal User Authentication, Toulouse, France
-
Phua, K., Dat, T. H., Chen, J., & Shue, L. (2006). Human identification using heart sound. Paper presented at the Second International Workshop on Multimodal User Authentication, Toulouse, France.
-
(2006)
Human Identification Using Heart Sound
-
-
Phua, K.1
Dat, T.H.2
Chen, J.3
Shue, L.4
-
135
-
-
0024861588
-
Automatic signature verification and writer identification: The state of the art
-
doi:10.1016/0031-3203(89)90059-9
-
Plamondon, R., & Lorette, G. (1989). Automatic signature verification and writer identification: The state of the art. Pattern Recognition, 22(2), 107-131. doi:10.1016/0031-3203(89)90059-9
-
(1989)
Pattern Recognition
, vol.22
, Issue.2
, pp. 107-131
-
-
Plamondon, R.1
Lorette, G.2
-
136
-
-
84901540995
-
-
poker-edge.com, Retrieved on June 7, 2006, from
-
poker-edge.com. (2006). Stats and analysis. Poker-edge.com Retrieved on June 7, 2006, from http://www.poker-edge.com/stats.php
-
(2006)
Stats and Analysis. Poker-edge.com
-
-
-
139
-
-
20444496997
-
-
Paper presented at the ACM Workshop on Visualization and Data Mining for Computer Security, Washington, D.C
-
Pusara, M., & Brodley, C. E. (2004). User reauthentication via mouse movements. Paper presented at the ACM Workshop on Visualization and Data Mining for Computer Security, Washington, D.C. (pp. 1-8).
-
(2004)
User Reauthentication Via Mouse Movements
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
141
-
-
84901543133
-
-
Paper presented at the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada
-
Ramon, J., & Jacobs, N. (2002). Opponent modeling by analysing play. Paper presented at the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada.
-
(2002)
Opponent Modeling By Analysing Play
-
-
Ramon, J.1
Jacobs, N.2
-
142
-
-
84901521193
-
-
March, Paper presented at the International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil
-
Ratha, N. K., Senior, A., & Bolle, R. M. (2001, March). Automated biometrics. Paper presented at the International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil.
-
(2001)
Automated Biometrics
-
-
Ratha, N.K.1
Senior, A.2
Bolle, R.M.3
-
143
-
-
33751109662
-
Quantifying the quality of Web authentication mechanisms. A usability perspective
-
Retrieved from
-
Renaud, K. (2003). Quantifying the quality of Web authentication mechanisms. A usability perspective. Journal of Web Engineering, 0(0). Retrieved from http://www.dcs.gla.ac.uk/~karen/papers/j.pdf
-
(2003)
Journal of Web Engineering
, vol.0
, Issue.0
-
-
Renaud, K.1
-
144
-
-
0141530914
-
The do-remi's of everyday life: The structure and personality correlates of music preferences
-
doi:10.1037/0022-3514.84.6.1236
-
Rentfrow, P. J., & Gosling, S. D. (2003). The do-remi's of everyday life: The structure and personality correlates of music preferences. Journal of Personality and Social Psychology, 84, 1236-1256. doi:10.1037/0022-3514.84.6.1236
-
(2003)
Journal of Personality and Social Psychology
, vol.84
, pp. 1236-1256
-
-
Rentfrow, P.J.1
Gosling, S.D.2
-
149
-
-
0012282403
-
Computer intrusion: Detecting maquerades
-
Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A. F., Theus, M., & Vardi, Y. (2001). Computer intrusion: Detecting maquerades. Statistical Science, 16(1), 1-17.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 1-17
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
150
-
-
1942537182
-
Spoofing and antispoofing measures
-
Schuckers, S. A. C. (2002). Spoofing and antispoofing measures. Information Security, 7(4), 56-62.
-
(2002)
Information Security
, vol.7
, Issue.4
, pp. 56-62
-
-
Schuckers, S.A.C.1
-
153
-
-
47849096614
-
A neural network application for attack detection in computer networks
-
Silva, L. S., Santos, A. F. D., Silva, J. D. D., & Montes, A. (2004). A neural network application for attack detection in computer networks. Instituto Nacional de Pesquisas Espanciais.
-
(2004)
Instituto Nacional De Pesquisas Espanciais
-
-
Silva, L.S.1
Santos, A.F.D.2
Silva, J.D.D.3
Montes, A.4
-
154
-
-
66149159137
-
-
Paper presented at the Security and Management, Las Vegas, NV
-
Solayappan, N., & Latifi, S. (2006). A survey of unimodal biometric methods. Paper presented at the Security and Management, Las Vegas, NV (pp. 57-63).
-
(2006)
A Survey of Unimodal Biometric Methods
, pp. 57-63
-
-
Solayappan, N.1
Latifi, S.2
-
157
-
-
85050214833
-
-
June, Paper presented at the Ninth Conf. European Chap. Assoc. Computational Linguistics, Bergen, Norway
-
Stamatatos, E., Fakotakis, N., & Kokkinakis, G. (1999, June). Automatic authorship attribution. Paper presented at the Ninth Conf. European Chap. Assoc. Computational Linguistics, Bergen, Norway (pp. 158-164).
-
(1999)
Automatic Authorship Attribution
, pp. 158-164
-
-
Stamatatos, E.1
Fakotakis, N.2
Kokkinakis, G.3
-
159
-
-
33745472867
-
-
June 15-17, Paper presented at the Sixth Annual IEEE Information Assurance Workshop
-
Stanton, P. T., Yurcik, W., & Brumbaugh, L. (2005, June 15-17). FABS: File and block surveillance system for determining anomalous disk accesses. Paper presented at the Sixth Annual IEEE Information Assurance Workshop (pp. 207-214).
-
(2005)
FABS: File and Block Surveillance System For Determining Anomalous Disk Accesses
, pp. 207-214
-
-
Stanton, P.T.1
Yurcik, W.2
Brumbaugh, L.3
-
160
-
-
84901552621
-
Watch on the Thames
-
Retrieved on October 4, 2005, from
-
Stecklow, S., Singer, J., & Patrick, A. (2005). Watch on the Thames. The Wall Street Journal. Retrieved on October 4, 2005, from http://online.wsj.com/public/article/sb112077340647880052ckyzgab0t3asu4udfvnpwroaqcy_20060708.html
-
(2005)
The Wall Street Journal
-
-
Stecklow, S.1
Singer, J.2
Patrick, A.3
-
161
-
-
67650697862
-
-
September, Paper presented at the Mathematical Methods, Models, and Architectures for Computer Networks Security
-
Stolfo, S. J., Hershkop, S., Wang, K., Nimeskern, O., & Hu, C.-W. (2003a, September). A behaviorbased approach to securing e-mail systems. Paper presented at the Mathematical Methods, Models, and Architectures for Computer Networks Security.
-
(2003)
A Behaviorbased Approach to Securing E-mail Systems
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
162
-
-
44349106280
-
-
(No. CU Tech. Rep.). Retrieved from
-
Stolfo, S. J., Hu, C.-W., Li, W.-J., Hershkop, S., Wang, K., & Nimeskern, O. (2003b). Combining behavior models to secure e-mail systems (No. CU Tech. Rep.). Retrieved from www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf
-
(2003)
Combining Behavior Models to Secure E-mail Systems
-
-
Stolfo, S.J.1
Hu, C.-W.2
Li, W.-J.3
Hershkop, S.4
Wang, K.5
Nimeskern, O.6
-
164
-
-
0031274649
-
Wide area Internet traffic patterns and characteristics
-
doi:10.1109/65.642356
-
Thompson, K., Miller, G., & Wilder, R. (1997). Wide area Internet traffic patterns and characteristics. IEEE Network, 11, 10-23. doi:10.1109/65.642356
-
(1997)
IEEE Network
, vol.11
, pp. 10-23
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
165
-
-
33745685825
-
-
October 23, Paper presented at the Workshop on New Security Paradigms, Lake Arrowhead, CA
-
Thorpe, J., Oorschot, P. C. V., & Somayaji, A. (2005, October 23). Pass-thoughts: Authenticating with our minds. Paper presented at the Workshop on New Security Paradigms, Lake Arrowhead, CA (pp. 45-56).
-
(2005)
Pass-thoughts: Authenticating With Our Minds
, pp. 45-56
-
-
Thorpe, J.1
Oorschot, P.C.V.2
Somayaji, A.3
-
167
-
-
33744976289
-
Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals
-
January, doi:10.1109/TSA.2005.854091
-
Tsai, W.-H., & Wang, H.-M. (2006a, January). Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals. IEEE Transactions on Audio, Speech, and Language Processing, 14(1), 330-341. doi:10.1109/TSA.2005.854091
-
(2006)
IEEE Transactions On Audio, Speech, and Language Processing
, vol.14
, Issue.1
, pp. 330-341
-
-
Tsai, W.-H.1
Wang, H.-M.2
-
168
-
-
33744976289
-
Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals
-
January, doi:10.1109/TSA.2005.854091
-
Tsai, W.-H., & Wang, H.-M. (2006b, January). Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals. IEEE Transactions on Audio, Speech, and Language Processing, 14(1), 330-341. doi:10.1109/TSA.2005.854091
-
(2006)
IEEE Transactions On Audio, Speech, and Language Processing
, vol.14
, Issue.1
, pp. 330-341
-
-
Tsai, W.-H.1
Wang, H.-M.2
-
170
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
doi:10.1109/JPROC.2004.827372
-
Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004). Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE, 92(6). doi:10.1109/JPROC.2004.827372
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
172
-
-
34548109598
-
-
Paper presented at the SIGMOD, Special Section on Data Mining for Intrusion Detection and Threat Analysis
-
Vel, O. D., Anderson, A., Corney, M., & Mohay, G. (2001). Mining e-mail content for author identification forensics. Paper presented at the SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis.
-
(2001)
Mining E-mail Content For Author Identification Forensics
-
-
Vel, O.D.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
173
-
-
8844254687
-
-
Paper presented at the Security, Steganography, and Watermarking of Multimedia Contents
-
Veldhuis, R. N. J., Bazen, A. M., Kauffman, J. A., & Hartel, P. H. (2004). Biometric verification based on grip-pattern recognition. Paper presented at the Security, Steganography, and Watermarking of Multimedia Contents (pp. 634-641).
-
(2004)
Biometric Verification Based On Grip-pattern Recognition
, pp. 634-641
-
-
Veldhuis, R.N.J.1
Bazen, A.M.2
Kauffman, J.A.3
Hartel, P.H.4
-
176
-
-
84880174811
-
-
May 9-12, Paper presented at the IEEE Symposium on Security and Privacy Oakland, CA
-
Warrender, C., Forrest, S., & Pearlmutter, B. (1999, May 9-12). Detecting intrusions using system calls: Alternative data models. Paper presented at the IEEE Symposium on Security and Privacy Oakland, CA (pp. 133-145).
-
(1999)
Detecting Intrusions Using System Calls: Alternative Data Models
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
178
-
-
84901532827
-
-
July, Paper presented at the Human Computer Interaction International (HCII), Las Vegas, NV
-
Westeyn, T., Pesti, P., Park, K., & Starner, T. (2005, July). Biometric identification using song-based eye blink patterns. Paper presented at the Human Computer Interaction International (HCII), Las Vegas, NV.
-
(2005)
Biometric Identification Using Song-based Eye Blink Patterns
-
-
Westeyn, T.1
Pesti, P.2
Park, K.3
Starner, T.4
-
180
-
-
84901510621
-
-
Wikipedia.org, Retrieved on October 6, 2005, from
-
Wikipedia.org. (2005). Behavioural sciences. Retrieved on October 6, 2005, from http://en.wikipedia.org/wiki/behavioral_sciences
-
(2005)
Behavioural Sciences
-
-
-
185
-
-
34548124975
-
-
th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, NA
-
th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, NA (pp. 831-836).
-
(2007)
Secure Network Authentication With Passtext
, pp. 831-836
-
-
Yampolskiy, R.V.1
-
188
-
-
84901550559
-
-
December 16-18, Paper presented at the International Conference on Signal Processing (ICSP 2006), Vienna, Austria
-
Yampolskiy, R. V., & Govindaraju, V. (2006a, December 16-18). Similarity measure functions for strategy-based biometrics. Paper presented at the International Conference on Signal Processing (ICSP 2006), Vienna, Austria.
-
(2006)
Similarity Measure Functions For Strategy-based Biometrics
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
189
-
-
33747666972
-
-
April 17-22, Paper presented at the Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, FL
-
Yampolskiy, R. V., & Govindaraju, V. (2006b, April 17-22). Use of behavioral biometrics in intrusion detection and online gaming. Paper presented at the Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, FL.
-
(2006)
Use of Behavioral Biometrics In Intrusion Detection and Online Gaming
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
190
-
-
67649656892
-
Direct and indirect human computer interaction based biometrics
-
Yampolskiy, R. V., & Govindaraju, V. (2007a). Direct and indirect human computer interaction based biometrics. Journal of Computers, 2(8), 76-88.
-
(2007)
Journal of Computers
, vol.2
, Issue.8
, pp. 76-88
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
191
-
-
35649007957
-
-
April 9-13, Paper presented at the Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium, Orlando, FL
-
Yampolskiy, R. V., & Govindaraju, V. (2007b, April 9-13). Dissimilarity functions for behaviorbased biometrics. Paper presented at the Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium, Orlando, FL.
-
(2007)
Dissimilarity Functions For Behaviorbased Biometrics
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
192
-
-
70350234989
-
Behavioral biometrics: A survey and classification
-
[IJBM], doi:10.1504/IJBM.2008.018665
-
Yampolskiy, R. V., & Govindaraju, V. (2008). Behavioral biometrics: A survey and classification. [IJBM]. International Journal of Biometric, 1(1), 81-113. doi:10.1504/IJBM.2008.018665
-
(2008)
International Journal of Biometric
, vol.1
, Issue.1
, pp. 81-113
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
193
-
-
84901552546
-
-
Paper presented at the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
-
Ye, N. (2000). A Markov chain model of temporal behavior for anomaly detection. Paper presented at the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop.
-
(2000)
A Markov Chain Model of Temporal Behavior For Anomaly Detection
-
-
Ye, N.1
-
194
-
-
0037209446
-
-
(n.d.), doi:10.1016/S0031-3203(02)00026-2
-
Yeung, D. Y., & Ding, Y. (2001). (n.d.) Hostbased intrusion detection using dynamic and static behavioral models. Pattern Recognition, 36, 229-243. doi:10.1016/S0031-3203(02)00026-2
-
(2001)
Hostbased Intrusion Detection Using Dynamic and Static Behavioral Models
, vol.36
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
195
-
-
84901534926
-
-
Retrieved on October 6, 2005, from
-
Yutaka, K. (2005). Behaviormetrics. Retrieved on October 6, 2005, from http://koko15.hus.osaka-u.ac.jp/
-
(2005)
Behaviormetrics
-
-
Yutaka, K.1
|