메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-43

Taxonomy of behavioural biometrics

Author keywords

[No Author keywords available]

Indexed keywords


EID: 78149304254     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-60566-725-6.ch001     Document Type: Chapter
Times cited : (29)

References (198)
  • 2
    • 84901564399 scopus 로고    scopus 로고
    • June, Paper presented at the Workshop on Information Assurance, United States Military Academy, West Point, NY
    • Ahmed, A. A. E., & Traore, I. (2005a, June). Anomaly intrusion detection based on biometrics. Paper presented at the Workshop on Information Assurance, United States Military Academy, West Point, NY.
    • (2005) Anomaly Intrusion Detection Based On Biometrics
    • Ahmed, A.A.E.1    Traore, I.2
  • 3
    • 84883286001 scopus 로고    scopus 로고
    • October, Paper presented at the Third Annual Conference on Privacy, Security, and Trust, St. Andrews, New Brunswick, Canada
    • Ahmed, A. A. E., & Traore, I. (2005b, October). Detecting computer intrusions using behavioral biometrics. Paper presented at the Third Annual Conference on Privacy, Security, and Trust, St. Andrews, New Brunswick, Canada.
    • (2005) Detecting Computer Intrusions Using Behavioral Biometrics
    • Ahmed, A.A.E.1    Traore, I.2
  • 6
    • 84901563547 scopus 로고    scopus 로고
    • March 27-30, Paper presented at the First UAE International Conference on Biological and Medical Physics
    • Angle, S., Bhagtani, R., & Chheda, H. (2005, March 27-30). Biometrics: A further echelon of security. Paper presented at the First UAE International Conference on Biological and Medical Physics.
    • (2005) Biometrics: A Further Echelon of Security
    • Angle, S.1    Bhagtani, R.2    Chheda, H.3
  • 12
    • 84901551283 scopus 로고    scopus 로고
    • Personal identifiers in musicians' finger movement dynamics
    • {black small square}{black small square}{black small square}
    • Bella, S. D., & Palmer, C. (2006). Personal identifiers in musicians' finger movement dynamics. Journal of Cognitive Neuroscience, {black small square}{black small square}{black small square}, 18.
    • (2006) Journal of Cognitive Neuroscience , vol.18
    • Bella, S.D.1    Palmer, C.2
  • 16
    • 84901533884 scopus 로고    scopus 로고
    • Bioprivacy.org, Retrieved on July 22, 2005, from
    • Bioprivacy.org. (2005a). FAQ. BioPrivacy Initiative. Retrieved on July 22, 2005, from http://www.bioprivacy.org/faqmain.htm
    • (2005) FAQ. BioPrivacy Initiative
  • 17
    • 37349014618 scopus 로고    scopus 로고
    • Bioprivacy.org, International Biometric Group, LLC. Retrieved on October 2, 2005, from
    • Bioprivacy.org. (2005b). FAQ's and definitions. International Biometric Group, LLC. Retrieved on October 2, 2005, from http://www.bioprivacy.org/bioprivacy_text.htm
    • (2005) FAQ's and Definitions
  • 20
    • 84901512703 scopus 로고    scopus 로고
    • July 6-9, Paper presented at the International Conference on Multimedia and Expo (ICME '03)
    • Bromme, A. (2003, July 6-9). A classification of biometric signatures. Paper presented at the International Conference on Multimedia and Expo (ICME '03) (pp. 17-20).
    • (2003) A Classification of Biometric Signatures , pp. 17-20
    • Bromme, A.1
  • 24
    • 0031233424 scopus 로고    scopus 로고
    • Speaker recognition: A tutorial
    • doi:10.1109/5.628714
    • Campbell, J. P. (1997). Speaker recognition: A tutorial. Proceedings of the IEEE, 85(9), 1437-1462. doi:10.1109/5.628714
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9 , pp. 1437-1462
    • Campbell, J.P.1
  • 26
    • 84947880300 scopus 로고    scopus 로고
    • Caslon.com.au, Retrieved on October 2, 2005, from
    • Caslon.com.au. (2005). Caslon-analytics. Retrieved on October 2, 2005, from http://www.caslon.com.au/biometricsnote8.htm
    • (2005) Caslon-analytics
  • 27
    • 15744379565 scopus 로고    scopus 로고
    • October 10-13, Paper presented at the IEEE International Conference on Systems, Man and Cybernetics
    • Ciota, Z. (2004, October 10-13). Speaker verification for multimedia application. Paper presented at the IEEE International Conference on Systems, Man and Cybernetics (pp. 2752-2756).
    • (2004) Speaker Verification For Multimedia Application , pp. 2752-2756
    • Ciota, Z.1
  • 31
    • 77950162284 scopus 로고    scopus 로고
    • June 18-20, Paper presented at the IEEE Information Assurance Workshop on Systems, Man, and Cybernetics Society
    • Dahel, S. K., & Xiao, Q. (2003, June 18-20). Accuracy performance analysis of multimodal biometrics. Paper presented at the IEEE Information Assurance Workshop on Systems, Man, and Cybernetics Society (pp. 170-173).
    • (2003) Accuracy Performance Analysis of Multimodal Biometrics , pp. 170-173
    • Dahel, S.K.1    Xiao, Q.2
  • 32
    • 84901515851 scopus 로고    scopus 로고
    • December 11-15, Paper presented at the International ICSC Conference on Intelligent Systems and Applications, University of Wollongong Australia
    • Dao, V., & Vemuri, V. (2000, December 11-15). Profiling users in the UNIX OS environment. Paper presented at the International ICSC Conference on Intelligent Systems and Applications, University of Wollongong Australia.
    • (2000) Profiling Users In the UNIX OS Environment
    • Dao, V.1    Vemuri, V.2
  • 35
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • doi:10.1109/TSE.1987.232894
    • Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 222-232. doi:10.1109/TSE.1987.232894
    • (1987) IEEE Transactions On Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 36
    • 33750965925 scopus 로고    scopus 로고
    • October 17-18, Paper presented at the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
    • Deshpande, S., Chikkerur, S., & Govindaraju, V. (2005, October 17-18). Accent classification in speech. Paper presented at the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (pp. 139-143).
    • (2005) Accent Classification In Speech , pp. 139-143
    • Deshpande, S.1    Chikkerur, S.2    Govindaraju, V.3
  • 38
    • 33744974361 scopus 로고    scopus 로고
    • Retrieved on October 6, 2005, from
    • Elissetche, M. M. (2005). Social science dictionary. Retrieved on October 6, 2005, from http://www.elissetche.org/dico/p.htm
    • (2005) Social Science Dictionary
    • Elissetche, M.M.1
  • 39
    • 26444499551 scopus 로고    scopus 로고
    • Multimodal person recognition for vehicular applications
    • Erdogan, H., Ercil, A., Ekenel, H., Bilgin, S., Eden, I., & Kirisci, M. (2005a). Multimodal person recognition for vehicular applications. LNCS, 3541, 366-375.
    • (2005) LNCS , vol.3541 , pp. 366-375
    • Erdogan, H.1    Ercil, A.2    Ekenel, H.3    Bilgin, S.4    Eden, I.5    Kirisci, M.6
  • 41
    • 33646007315 scopus 로고    scopus 로고
    • Multimodal person recognition for human-vehicle interaction
    • doi:10.1109/MMUL.2006.37
    • Erzin, E., Yemez, Y., Tekalp, A. M., Erçil, A., Erdogan, H., & Abut, H. (2006). Multimodal person recognition for human-vehicle interaction. IEEE MultiMedia, 13, 18-31. doi:10.1109/MMUL.2006.37
    • (2006) IEEE MultiMedia , vol.13 , pp. 18-31
    • Erzin, E.1    Yemez, Y.2    Tekalp, A.M.3    Erçil, A.4    Erdogan, H.5    Abut, H.6
  • 42
    • 0013113240 scopus 로고    scopus 로고
    • Adaptive fraud detection
    • doi:10.1023/A:1009700419189
    • Fawcett, T., & Provost, F. (1997). Adaptive fraud detection. Data Mining and Knowledge Discovery, 1(3), 291-316. doi:10.1023/A:1009700419189
    • (1997) Data Mining and Knowledge Discovery , vol.1 , Issue.3 , pp. 291-316
    • Fawcett, T.1    Provost, F.2
  • 46
    • 84901517773 scopus 로고    scopus 로고
    • June, Paper presented at the International Conference on Internet Computing (IC'2002), Las Vegas, NV
    • Fu, Y., & Shih, M. (2002, June). A framework for personal Web usage mining. Paper presented at the International Conference on Internet Computing (IC'2002), Las Vegas, NV (pp. 595-600).
    • (2002) A Framework For Personal Web Usage Mining , pp. 595-600
    • Fu, Y.1    Shih, M.2
  • 53
    • 34548122028 scopus 로고    scopus 로고
    • User profiling for intrusion detection in windows NT
    • Goldring, T. (2003). User profiling for intrusion detection in windows NT. Computing Science and Statistics, 35.
    • (2003) Computing Science and Statistics , vol.35
    • Goldring, T.1
  • 57
    • 33745198933 scopus 로고    scopus 로고
    • Paper presented at the Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Madrid, Spain
    • Gunetti, D., Picardi, C., & Ruffo, G. (2005). Keystroke analysis of different languages: A case study. Paper presented at the Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Madrid, Spain (pp. 133-144).
    • (2005) Keystroke Analysis of Different Languages: A Case Study , pp. 133-144
    • Gunetti, D.1    Picardi, C.2    Ruffo, G.3
  • 67
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Ilgun, K., Kemmerer, R.A., & Porras, P.A. (1995). State transition analysis: A rule-based intrusion detection approach. Software Engineering, 21(3), 181-199.
    • (1995) Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 68
    • 34147151570 scopus 로고    scopus 로고
    • Retrieved on July 12, 2006, from
    • Ilonen, J. (2006). Keystroke dynamics. Retrieved on July 12, 2006, from www.it.lut.fi/kurssit/03-04/010970000/seminars/ilonen.pdf
    • (2006) Keystroke Dynamics
    • Ilonen, J.1
  • 70
    • 84877970764 scopus 로고    scopus 로고
    • Paper presented at the Education Next Retrieved from
    • Jacob, B. A., & Levitt, S. D. (2004). To catch a cheat. Paper presented at the Education Next Retrieved from www.educationnext.org
    • (2004) To Catch a Cheat
    • Jacob, B.A.1    Levitt, S.D.2
  • 71
    • 0036887670 scopus 로고    scopus 로고
    • Online signature verification
    • doi:10.1016/S0031-3203(01)002400
    • Jain, A., Griess, F., & Connell, S. (2002). Online signature verification. Pattern Recognition, 35, 2963-2972. doi:10.1016/S0031-3203(01)002400
    • (2002) Pattern Recognition , vol.35 , pp. 2963-2972
    • Jain, A.1    Griess, F.2    Connell, S.3
  • 74
    • 33646138841 scopus 로고    scopus 로고
    • July, Paper presented at the International Conference on Biometric Authentication (ICBA), Hong Kong
    • Jain, A. K., Dass, S. C., & Nandakumar, K. (2004b, July). Soft biometric traits for personal recognition systems. Paper presented at the International Conference on Biometric Authentication (ICBA), Hong Kong (pp. 731-738).
    • (2004) Soft Biometric Traits For Personal Recognition Systems , pp. 731-738
    • Jain, A.K.1    Dass, S.C.2    Nandakumar, K.3
  • 77
    • 25144471298 scopus 로고    scopus 로고
    • Score normalization in multimodal biometric systems
    • doi:10.1016/j.patcog.2005.01.012
    • Jain, K., Nandakumar, K., & Ross, A. (2005). Score normalization in multimodal biometric systems. Pattern Recognition, 38(12), 2270-2285. doi:10.1016/j.patcog.2005.01.012
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2270-2285
    • Jain, K.1    Nandakumar, K.2    Ross, A.3
  • 80
    • 0031220766 scopus 로고    scopus 로고
    • Acoustic-labial speaker verification
    • doi:10.1016/S0167-8655(97)00070-6
    • Jourlin, P., Luettin, J., Genoud, D., & Wassner, H. (1997). Acoustic-labial speaker verification. Pattern Recognition Letters, 18(9), 853-858. doi:10.1016/S0167-8655(97)00070-6
    • (1997) Pattern Recognition Letters , vol.18 , Issue.9 , pp. 853-858
    • Jourlin, P.1    Luettin, J.2    Genoud, D.3    Wassner, H.4
  • 86
    • 33750798519 scopus 로고    scopus 로고
    • April, Paper presented at the IEEE ITNG 2006, Internet and Wireless Network Security Track, Las Vegas, NV
    • Kim, Y., Jo, J.-Y., & Suh, K. (2006, April). Baseline profile stability for network anomaly detection. Paper presented at the IEEE ITNG 2006, Internet and Wireless Network Security Track, Las Vegas, NV.
    • (2006) Baseline Profile Stability For Network Anomaly Detection
    • Kim, Y.1    Jo, J.-Y.2    Suh, K.3
  • 89
    • 84901548938 scopus 로고    scopus 로고
    • January, Paper presented at the Eighth International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, FL
    • Koppel, M., Schler, J., & Mughaz, D. (2004, January). Text categorization for authorship verification. Paper presented at the Eighth International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, FL.
    • (2004) Text Categorization For Authorship Verification
    • Koppel, M.1    Schler, J.2    Mughaz, D.3
  • 90
    • 33646244129 scopus 로고    scopus 로고
    • Retrieved on October 12, 2008, from
    • Korotkaya, Z. (2003). Biometrics person authentication: Odor. Retrieved on October 12, 2008, from http://www.it.lut.fi/kurssit/03-04/010970000/seminars/korotkaya.pdf
    • (2003) Biometrics Person Authentication: Odor
    • Korotkaya, Z.1
  • 91
    • 84901567712 scopus 로고    scopus 로고
    • Paper presented at the Workshop: Machine Learning in New Information Age, Barcelona, Spain
    • Koychev, I., & Schwab, I. (2000). Adaptation to drifting user's interests. Paper presented at the Workshop: Machine Learning in New Information Age, Barcelona, Spain.
    • (2000) Adaptation to Drifting User's Interests
    • Koychev, I.1    Schwab, I.2
  • 97
    • 0242323507 scopus 로고    scopus 로고
    • A new similarity measure based on intraclass statistics for biometric systems
    • doi:10.4218/etrij.03.0102.0017
    • Lee, K., & Park, H. (2003). A new similarity measure based on intraclass statistics for biometric systems. ETRI Journal, 25(5), 401-406. doi:10.4218/etrij.03.0102.0017
    • (2003) ETRI Journal , vol.25 , Issue.5 , pp. 401-406
    • Lee, K.1    Park, H.2
  • 102
    • 21644484352 scopus 로고    scopus 로고
    • November 7-10, Paper presented at the Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers
    • Lin, X., & Simske, S. (2004, November 7-10). Phoneme-less hierarchical accent classification. Paper presented at the Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers (pp. 1801-1804).
    • (2004) Phoneme-less Hierarchical Accent Classification , pp. 1801-1804
    • Lin, X.1    Simske, S.2
  • 105
    • 24744457752 scopus 로고    scopus 로고
    • April 4-6, Paper presented at the International Conference on Information Technology: Coding and Computing (ITCC 2005)
    • Liu, Z., & Bridges, S. M. (2005, April 4-6). Dynamic learning of automata from the call stack log for anomaly detection. Paper presented at the International Conference on Information Technology: Coding and Computing (ITCC 2005) (pp. 774-779).
    • (2005) Dynamic Learning of Automata From the Call Stack Log For Anomaly Detection , pp. 774-779
    • Liu, Z.1    Bridges, S.M.2
  • 107
    • 84901511134 scopus 로고
    • Paper presented at the Conference on Auditing and Computer Technology
    • Lunt, T. (1993). Detecting intruders in computer systems. Paper presented at the Conference on Auditing and Computer Technology.
    • (1993) Detecting Intruders In Computer Systems
    • Lunt, T.1
  • 108
    • 10344226218 scopus 로고    scopus 로고
    • A digital technique for art authentication
    • Lyu, S., Rockmore, D., & Farid, H. (2004). A digital technique for art authentication. National Academy of Sciences, 101(49), 17006-17010.
    • (2004) National Academy of Sciences , vol.101 , Issue.49 , pp. 17006-17010
    • Lyu, S.1    Rockmore, D.2    Farid, H.3
  • 109
    • 84901513294 scopus 로고    scopus 로고
    • Retrieved on July 28, 2006, from
    • Mainguet, J.-F. (2006). Biometrics, Retrieved on July 28, 2006, from http://perso.orange.fr/fingerchip/biometrics/biometrics.htm
    • (2006) Biometrics
    • Mainguet, J.-F.1
  • 111
    • 33947505230 scopus 로고    scopus 로고
    • Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation
    • doi:10.1109/TPAMI.2007.1012
    • Marcel, S., & Millan, J. (2007). Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4), 743-752. doi:10.1109/TPAMI.2007.1012
    • (2007) IEEE Transactions On Pattern Analysis and Machine Intelligence , vol.29 , Issue.4 , pp. 743-752
    • Marcel, S.1    Millan, J.2
  • 114
    • 0036931591 scopus 로고    scopus 로고
    • June 23-26, Paper presented at the International Conference of Dependable Systems and Networks, Washington, D.C
    • Maxion, R. A., & Townsend, T. N. (2002a, June 23-26). Masquerade detection using truncated command lines. Paper presented at the International Conference of Dependable Systems and Networks, Washington, D.C.
    • (2002) Masquerade Detection Using Truncated Command Lines
    • Maxion, R.A.1    Townsend, T.N.2
  • 116
  • 121
    • 84901567535 scopus 로고    scopus 로고
    • June 2-4, Paper presented at the Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI'2004), Miami, FL
    • Muralidharan, N., & Wunnava, S. (2004, June 2-4). Signature verification: A popular biometric technology. Paper presented at the Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI'2004), Miami, FL.
    • (2004) Signature Verification: A Popular Biometric Technology
    • Muralidharan, N.1    Wunnava, S.2
  • 122
    • 0031070158 scopus 로고    scopus 로고
    • Automatic online signature verification
    • doi:10.1109/5.554220
    • Nalwa, V. S. (1997). Automatic online signature verification. Proceedings of the IEEE, 85, 215-239. doi:10.1109/5.554220
    • (1997) Proceedings of the IEEE , vol.85 , pp. 215-239
    • Nalwa, V.S.1
  • 123
  • 125
    • 33747630166 scopus 로고    scopus 로고
    • Unpublished MS thesis, Rochester Institute of Technology, Rochester, NY
    • Novikov, D. (2005). Neural networks to intrusion detection. Unpublished MS thesis, Rochester Institute of Technology, Rochester, NY.
    • (2005) Neural Networks to Intrusion Detection
    • Novikov, D.1
  • 126
    • 33750804406 scopus 로고    scopus 로고
    • April 10-12, Paper presented at the Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, NV
    • Novikov, D., Yampolskiy, R. V., & Reznik, L. (2006a, April 10-12). Anomaly detection based intrusion detection. Paper presented at the Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, NV (pp. 420-425).
    • (2006) Anomaly Detection Based Intrusion Detection , pp. 420-425
    • Novikov, D.1    Yampolskiy, R.V.2    Reznik, L.3
  • 127
    • 47849130842 scopus 로고    scopus 로고
    • May 5, Paper presented at the Long Island Systems Applications and Technology Conference (LISAT2006), Long Island, NY
    • Novikov, D., Yampolskiy, R. V., & Reznik, L. (2006b, May 5). Artificial intelligence approaches for intrusion detection. Paper presented at the Long Island Systems Applications and Technology Conference (LISAT2006), Long Island, NY (pp. 1-8).
    • (2006) Artificial Intelligence Approaches For Intrusion Detection , pp. 1-8
    • Novikov, D.1    Yampolskiy, R.V.2    Reznik, L.3
  • 132
    • 84901516936 scopus 로고    scopus 로고
    • Paper presented at the IEEE International Conference on Multimedia and Expo (ICME '02)
    • Paper presented at the IEEE International Conference on Multimedia and Expo (ICME '02) (pp. 573-576).
  • 134
    • 84901526331 scopus 로고    scopus 로고
    • Paper presented at the Second International Workshop on Multimodal User Authentication, Toulouse, France
    • Phua, K., Dat, T. H., Chen, J., & Shue, L. (2006). Human identification using heart sound. Paper presented at the Second International Workshop on Multimodal User Authentication, Toulouse, France.
    • (2006) Human Identification Using Heart Sound
    • Phua, K.1    Dat, T.H.2    Chen, J.3    Shue, L.4
  • 135
    • 0024861588 scopus 로고
    • Automatic signature verification and writer identification: The state of the art
    • doi:10.1016/0031-3203(89)90059-9
    • Plamondon, R., & Lorette, G. (1989). Automatic signature verification and writer identification: The state of the art. Pattern Recognition, 22(2), 107-131. doi:10.1016/0031-3203(89)90059-9
    • (1989) Pattern Recognition , vol.22 , Issue.2 , pp. 107-131
    • Plamondon, R.1    Lorette, G.2
  • 136
    • 84901540995 scopus 로고    scopus 로고
    • poker-edge.com, Retrieved on June 7, 2006, from
    • poker-edge.com. (2006). Stats and analysis. Poker-edge.com Retrieved on June 7, 2006, from http://www.poker-edge.com/stats.php
    • (2006) Stats and Analysis. Poker-edge.com
  • 139
    • 20444496997 scopus 로고    scopus 로고
    • Paper presented at the ACM Workshop on Visualization and Data Mining for Computer Security, Washington, D.C
    • Pusara, M., & Brodley, C. E. (2004). User reauthentication via mouse movements. Paper presented at the ACM Workshop on Visualization and Data Mining for Computer Security, Washington, D.C. (pp. 1-8).
    • (2004) User Reauthentication Via Mouse Movements , pp. 1-8
    • Pusara, M.1    Brodley, C.E.2
  • 141
    • 84901543133 scopus 로고    scopus 로고
    • Paper presented at the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada
    • Ramon, J., & Jacobs, N. (2002). Opponent modeling by analysing play. Paper presented at the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada.
    • (2002) Opponent Modeling By Analysing Play
    • Ramon, J.1    Jacobs, N.2
  • 142
    • 84901521193 scopus 로고    scopus 로고
    • March, Paper presented at the International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil
    • Ratha, N. K., Senior, A., & Bolle, R. M. (2001, March). Automated biometrics. Paper presented at the International Conference on Advances in Pattern Recognition, Rio de Janeiro, Brazil.
    • (2001) Automated Biometrics
    • Ratha, N.K.1    Senior, A.2    Bolle, R.M.3
  • 143
    • 33751109662 scopus 로고    scopus 로고
    • Quantifying the quality of Web authentication mechanisms. A usability perspective
    • Retrieved from
    • Renaud, K. (2003). Quantifying the quality of Web authentication mechanisms. A usability perspective. Journal of Web Engineering, 0(0). Retrieved from http://www.dcs.gla.ac.uk/~karen/papers/j.pdf
    • (2003) Journal of Web Engineering , vol.0 , Issue.0
    • Renaud, K.1
  • 144
    • 0141530914 scopus 로고    scopus 로고
    • The do-remi's of everyday life: The structure and personality correlates of music preferences
    • doi:10.1037/0022-3514.84.6.1236
    • Rentfrow, P. J., & Gosling, S. D. (2003). The do-remi's of everyday life: The structure and personality correlates of music preferences. Journal of Personality and Social Psychology, 84, 1236-1256. doi:10.1037/0022-3514.84.6.1236
    • (2003) Journal of Personality and Social Psychology , vol.84 , pp. 1236-1256
    • Rentfrow, P.J.1    Gosling, S.D.2
  • 150
    • 1942537182 scopus 로고    scopus 로고
    • Spoofing and antispoofing measures
    • Schuckers, S. A. C. (2002). Spoofing and antispoofing measures. Information Security, 7(4), 56-62.
    • (2002) Information Security , vol.7 , Issue.4 , pp. 56-62
    • Schuckers, S.A.C.1
  • 152
  • 157
    • 85050214833 scopus 로고    scopus 로고
    • June, Paper presented at the Ninth Conf. European Chap. Assoc. Computational Linguistics, Bergen, Norway
    • Stamatatos, E., Fakotakis, N., & Kokkinakis, G. (1999, June). Automatic authorship attribution. Paper presented at the Ninth Conf. European Chap. Assoc. Computational Linguistics, Bergen, Norway (pp. 158-164).
    • (1999) Automatic Authorship Attribution , pp. 158-164
    • Stamatatos, E.1    Fakotakis, N.2    Kokkinakis, G.3
  • 160
    • 84901552621 scopus 로고    scopus 로고
    • Watch on the Thames
    • Retrieved on October 4, 2005, from
    • Stecklow, S., Singer, J., & Patrick, A. (2005). Watch on the Thames. The Wall Street Journal. Retrieved on October 4, 2005, from http://online.wsj.com/public/article/sb112077340647880052ckyzgab0t3asu4udfvnpwroaqcy_20060708.html
    • (2005) The Wall Street Journal
    • Stecklow, S.1    Singer, J.2    Patrick, A.3
  • 164
    • 0031274649 scopus 로고    scopus 로고
    • Wide area Internet traffic patterns and characteristics
    • doi:10.1109/65.642356
    • Thompson, K., Miller, G., & Wilder, R. (1997). Wide area Internet traffic patterns and characteristics. IEEE Network, 11, 10-23. doi:10.1109/65.642356
    • (1997) IEEE Network , vol.11 , pp. 10-23
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 165
  • 167
    • 33744976289 scopus 로고    scopus 로고
    • Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals
    • January, doi:10.1109/TSA.2005.854091
    • Tsai, W.-H., & Wang, H.-M. (2006a, January). Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals. IEEE Transactions on Audio, Speech, and Language Processing, 14(1), 330-341. doi:10.1109/TSA.2005.854091
    • (2006) IEEE Transactions On Audio, Speech, and Language Processing , vol.14 , Issue.1 , pp. 330-341
    • Tsai, W.-H.1    Wang, H.-M.2
  • 168
    • 33744976289 scopus 로고    scopus 로고
    • Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals
    • January, doi:10.1109/TSA.2005.854091
    • Tsai, W.-H., & Wang, H.-M. (2006b, January). Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals. IEEE Transactions on Audio, Speech, and Language Processing, 14(1), 330-341. doi:10.1109/TSA.2005.854091
    • (2006) IEEE Transactions On Audio, Speech, and Language Processing , vol.14 , Issue.1 , pp. 330-341
    • Tsai, W.-H.1    Wang, H.-M.2
  • 170
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • doi:10.1109/JPROC.2004.827372
    • Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004). Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE, 92(6). doi:10.1109/JPROC.2004.827372
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 180
    • 84901510621 scopus 로고    scopus 로고
    • Wikipedia.org, Retrieved on October 6, 2005, from
    • Wikipedia.org. (2005). Behavioural sciences. Retrieved on October 6, 2005, from http://en.wikipedia.org/wiki/behavioral_sciences
    • (2005) Behavioural Sciences
  • 185
    • 34548124975 scopus 로고    scopus 로고
    • th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, NA
    • th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, NA (pp. 831-836).
    • (2007) Secure Network Authentication With Passtext , pp. 831-836
    • Yampolskiy, R.V.1
  • 189
    • 33747666972 scopus 로고    scopus 로고
    • April 17-22, Paper presented at the Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, FL
    • Yampolskiy, R. V., & Govindaraju, V. (2006b, April 17-22). Use of behavioral biometrics in intrusion detection and online gaming. Paper presented at the Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, FL.
    • (2006) Use of Behavioral Biometrics In Intrusion Detection and Online Gaming
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 190
    • 67649656892 scopus 로고    scopus 로고
    • Direct and indirect human computer interaction based biometrics
    • Yampolskiy, R. V., & Govindaraju, V. (2007a). Direct and indirect human computer interaction based biometrics. Journal of Computers, 2(8), 76-88.
    • (2007) Journal of Computers , vol.2 , Issue.8 , pp. 76-88
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 191
    • 35649007957 scopus 로고    scopus 로고
    • April 9-13, Paper presented at the Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium, Orlando, FL
    • Yampolskiy, R. V., & Govindaraju, V. (2007b, April 9-13). Dissimilarity functions for behaviorbased biometrics. Paper presented at the Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium, Orlando, FL.
    • (2007) Dissimilarity Functions For Behaviorbased Biometrics
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 192
    • 70350234989 scopus 로고    scopus 로고
    • Behavioral biometrics: A survey and classification
    • [IJBM], doi:10.1504/IJBM.2008.018665
    • Yampolskiy, R. V., & Govindaraju, V. (2008). Behavioral biometrics: A survey and classification. [IJBM]. International Journal of Biometric, 1(1), 81-113. doi:10.1504/IJBM.2008.018665
    • (2008) International Journal of Biometric , vol.1 , Issue.1 , pp. 81-113
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 193
    • 84901552546 scopus 로고    scopus 로고
    • Paper presented at the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
    • Ye, N. (2000). A Markov chain model of temporal behavior for anomaly detection. Paper presented at the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop.
    • (2000) A Markov Chain Model of Temporal Behavior For Anomaly Detection
    • Ye, N.1
  • 195
    • 84901534926 scopus 로고    scopus 로고
    • Retrieved on October 6, 2005, from
    • Yutaka, K. (2005). Behaviormetrics. Retrieved on October 6, 2005, from http://koko15.hus.osaka-u.ac.jp/
    • (2005) Behaviormetrics
    • Yutaka, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.