-
1
-
-
84883286001
-
Detecting computer intrusions using behavioral biometrics
-
A.A.E. Ahmed and I. Traore. Detecting computer intrusions using behavioral biometrics. In Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, 2005.
-
Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, 2005
-
-
Ahmed, A.A.E.1
Traore, I.2
-
2
-
-
57949107783
-
A novel sliding window based change detection algorithm for asymmetric traffic
-
E. Ahmed, A. Clark, and G. Mohay. A novel sliding window based change detection algorithm for asymmetric traffic. In Network and Parallel Computing, 2008. NPC 2008. IFIP International Conference on, pages 168-175, 2008.
-
(2008)
Network and Parallel Computing, 2008. NPC 2008. IFIP International Conference on
, pp. 168-175
-
-
Ahmed, E.1
Clark, A.2
Mohay, G.3
-
3
-
-
57749190760
-
Impostor Users Discovery Using a Multimodal Biometric Continuous Authentication Fuzzy System
-
A. Azzini and S. Marrara. Impostor Users Discovery Using a Multimodal Biometric Continuous Authentication Fuzzy System. Lecture Notes in Computer Science, 5178:371-378, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5178
, pp. 371-378
-
-
Azzini, A.1
Marrara, S.2
-
9
-
-
0029734184
-
The marginalized likelihood ratio test for detecting abrupt changes
-
F. Gustafsson. The marginalized likelihood ratio test for detecting abrupt changes. IEEE Transactions on automatic control, 41(1):66-78, 1996.
-
(1996)
IEEE Transactions on Automatic Control
, vol.41
, Issue.1
, pp. 66-78
-
-
Gustafsson, F.1
-
13
-
-
50649103739
-
Event detection in crowded videos
-
Citeseer
-
Y. Ke, R. Sukthankar, and M. Hebert. Event detection in crowded videos. In IEEE International Conference on Computer Vision, volume 23, pages 38-41. Citeseer, 2007.
-
(2007)
IEEE International Conference on Computer Vision
, vol.23
, pp. 38-41
-
-
Ke, Y.1
Sukthankar, R.2
Hebert, M.3
-
15
-
-
69949156126
-
An Usability Study of Continuous Biometrics Authentication
-
Springer-Verlag
-
G. Kwang, R.H. Yap, T. Sim, and R. Ramnath. An Usability Study of Continuous Biometrics Authentication. In Proceedings of the Third International Conference on Advances in Biometrics, pages 828-837. Springer-Verlag, 2009.
-
(2009)
Proceedings of the Third International Conference on Advances in Biometrics
, pp. 828-837
-
-
Kwang, G.1
Yap, R.H.2
Sim, T.3
Ramnath, R.4
-
16
-
-
51249098041
-
A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks
-
J. Liu, FR Yu, C.H. Lung, and H. Tang. A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks. In IEEE International Conference on Communications, 2008. ICC'08, pages 1515-1519, 2008.
-
(2008)
IEEE International Conference on Communications, 2008. ICC'08
, pp. 1515-1519
-
-
Liu, J.1
Yu, F.R.2
Lung, C.H.3
Tang, H.4
-
19
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
L. O'Gorman. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12):2021-2040, 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
20
-
-
70350684014
-
-
PhD thesis, Center for Education and Research in Information Assurance and Security, Purdue Univeristy August
-
M. Pusara. An Examination of User Behavior for Re-authentication. PhD thesis, Center for Education and Research in Information Assurance and Security, Purdue Univeristy (August 2007).
-
(2007)
An Examination of User Behavior for Re-authentication
-
-
Pusara, M.1
|