-
1
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi, "User authentication through keystroke dynamics," ACM Trans. Information & System Security, 5(4), 367-397, 2002.
-
(2002)
ACM Trans. Information & System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
2
-
-
10044297649
-
-
Springer-Verlag
-
R.M. Bolle, J.H. Connell, S. Pankanti, N. K. Ratha, and A. W. Senior, Guide to Biometrics: Springer-Verlag, 2004.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankanti, S.3
Ratha, N.K.4
Senior, A.W.5
-
4
-
-
78650314350
-
Simulating ROC curves for multivariate biometric verification models
-
S. Cha and C.C. Tappert, "Simulating ROC curves for multivariate biometric verification models," CSIS Tech. Report 267, Pace Univ., 2009.
-
(2009)
CSIS Tech. Report 267, Pace Univ.
-
-
Cha, S.1
Tappert, C.C.2
-
5
-
-
79956152106
-
Use of histogram distances in iris authentication
-
Las Vegas
-
S. Choi, S. Yoon, S. Cha, and C.C. Tappert, "Use of histogram distances in iris authentication," Proc. MCSCE-MLMTA, Las Vegas, 2004.
-
(2004)
Proc. MCSCE-MLMTA
-
-
Choi, S.1
Yoon, S.2
Cha, S.3
Tappert, C.C.4
-
6
-
-
0029307876
-
A k-nearest neighbor classification rule based on Dempster-Shafer Theory
-
T. Denoeux, "A k-nearest neighbor classification rule based on Dempster-Shafer Theory," IEEE Trans. Systems, Man and Cybernetics, vol. 25, pp. 804-813, 1995.
-
(1995)
IEEE Trans. Systems, Man and Cybernetics
, vol.25
, pp. 804-813
-
-
Denoeux, T.1
-
7
-
-
36048978381
-
The problems of using ROC curve as the sole criterion in positive biometrics identification
-
Y. Du and C.-I. Chang, "The problems of using ROC curve as the sole criterion in positive biometrics identification," Proc. SPIE, v. 6579, 2007.
-
(2007)
Proc. SPIE
, vol.6579
-
-
Du, Y.1
Chang, C.-I.2
-
8
-
-
71749104688
-
Keystroke dynamics with low constraints svm based passphrase enrollment
-
R. Giot, M. El-Abed, and C. Rosenberger, "Keystroke dynamics with low constraints svm based passphrase enrollment," IEEE Int. Conf. Biometrics: Theory, Applications, and Systems (BTAS 2009), 2009.
-
(2009)
IEEE Int. Conf. Biometrics: Theory, Applications, and Systems (BTAS 2009)
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
9
-
-
33745215614
-
Keystroke analysis of free text
-
D. Gunetti and C. Picardi, "Keystroke analysis of free text," ACM Trans. Information & System Security, 8(3), 312-347, 2005.
-
(2005)
ACM Trans. Information & System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
10
-
-
56549092419
-
The effect of clock resolution on keystroke dynamics
-
also R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in CS (LNCS), Springer
-
K.S. Killourhy and R.A. Maxion, "The Effect of Clock Resolution on Keystroke Dynamics." 11th Int. Sym. Recent Advances Intrusion Detection (RAID-08), 2008, also R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in CS (LNCS), Vol. 5230, pp. 331-350, Springer.
-
(2008)
11th Int. Sym. Recent Advances Intrusion Detection (RAID-08)
, vol.5230
, pp. 331-350
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
11
-
-
70450014575
-
Comparing anomaly-detection algorithms for keystroke dynamics
-
Lisbon, Portugal, 2009, IEEE Computer Society Press, Los Alamitos
-
K.S. Killourhy and R.A. Maxion, "Comparing Anomaly-Detection Algorithms for Keystroke Dynamics." Proc. Int. Conf. Dependable Systems & Networks (DSN-09), pp. 125-134, Lisbon, Portugal, 2009. IEEE Computer Society Press, Los Alamitos, 2009.
-
(2009)
Proc. Int. Conf. Dependable Systems & Networks (DSN-09)
, pp. 125-134
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
12
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Y. Liao and V.R. Vemuri, "Use of K-Nearest Neighbor Classifier for Intrusion Detection, Computers and Security, v. 21, 2002, pp 439-448.
-
(2002)
Computers and Security
, vol.21
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
13
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
F. Monrose and A.D. Rubin, Keystroke dynamics as a biometric for authentication," Future Gen. Computer Systems, 16(4), 351-359, 2000.
-
(2000)
Future Gen. Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
14
-
-
12844274372
-
Typing patterns: A key to user identification
-
A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification," IEEE Security & Privacy, 2(5), 40-47, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
16
-
-
78650403533
-
IAM online: Hot topics and current issues in identity and access management - Provisioning remote users and the impact of the HEOA on distance education
-
March
-
M. Scheible and L. McNabb, "IAM Online: Hot Topics and Current Issues in Identity and Access Management - Provisioning Remote Users and the Impact of the HEOA on Distance Education," Web Conference, March 2010, http://www.incommonfederation.org/docs/iamonline/ Remote%20Credentialing%20IAM%20Online%20-%20Final.pdf.
-
(2010)
Web Conference
-
-
Scheible, M.1
McNabb, L.2
-
17
-
-
84987814715
-
-
accessed 2010
-
Scholarpedia, "K-nearest neighbor," http://www.scholarpedia. org/article/Knearest-neighbor, accessed 2010.
-
K-nearest Neighbor
-
-
-
18
-
-
0036313845
-
Individuality of handwriting
-
S. N. Srihari, S. Cha, H. Arora, S. Lee, "Individuality of handwriting," Journal of Forensic Sciences, vol. 47, pp. 1-17, 2002.
-
(2002)
Journal of Forensic Sciences
, vol.47
, pp. 1-17
-
-
Srihari, S.N.1
Cha, S.2
Arora, H.3
Lee, S.4
-
19
-
-
0030866323
-
Receiver operating characteristic studies and measurement errors
-
M.C.S. Sukhatme, "Receiver Operating Characteristic Studies and Measurement Errors," Biometrics, vol. 53, pp. 823-837, 1997.
-
(1997)
Biometrics
, vol.53
, pp. 823-837
-
-
Sukhatme, M.C.S.1
-
20
-
-
78650286294
-
A Keystroke biometric system for long-text input
-
to appear 2010
-
C.C. Tappert, S. Cha, M. Villani, and R.S. Zack, "A Keystroke Biometric System for Long-Text Input," Int. J. Info. Security and Privacy, to appear 2010.
-
Int. J. Info. Security and Privacy
-
-
Tappert, C.C.1
Cha, S.2
Villani, M.3
Zack, R.S.4
-
21
-
-
78649285491
-
Keystroke biometric identification and authentication on long-text input
-
L. Wang and X. Geng, Eds. Medical Info. Sci. Ref., New York
-
C.C. Tappert, M. Villani, and S. Cha, "Keystroke biometric identification and authentication on long-text input," in Behavioral Biometrics for Human Identification: Intelligent Applications, L. Wang and X. Geng, Eds., Medical Info. Sci. Ref., New York, 2009.
-
(2009)
Behavioral Biometrics for Human Identification: Intelligent Applications
-
-
Tappert, C.C.1
Villani, M.2
Cha, S.3
-
22
-
-
33845529124
-
Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
-
New York
-
M. Villani, C. Tappert, G. Ngo, J. Simone, H. St. Fort, S. Cha, "Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions," in Proc. Computer Vision & Pattern Recognition Workshop on Biometrics, New York, 2006.
-
(2006)
Proc. Computer Vision & Pattern Recognition Workshop on Biometrics
-
-
Villani, M.1
Tappert, C.2
Ngo, G.3
Simone, J.4
Fort, H.St.5
Cha, S.6
-
23
-
-
84871870853
-
-
accessed 2010
-
Wikipedia, "k-nearest neighbor algorithm," http://en.wikipedia. org/wiki/Knearest-neighbor-algorithm, accessed 2010.
-
K-nearest Neighbor Algorithm
-
-
-
24
-
-
84891392116
-
-
accessed 2010
-
Wikipedia, "Receiver operating characteristic," http://en.wikipedia.org/wiki/Receiver-operating-characteristic, accessed 2010.
-
Receiver Operating Characteristic
-
-
-
25
-
-
33947313355
-
A Regression-based K nearest neighbor algorithm for gene function prediction from heterogeneous data
-
Z. Yao and W.L. Ruzzo, A Regression-based K nearest neighbor algorithm for gene function prediction from heterogeneous data," BMC Bioinformatics, 7, 2006.
-
(2006)
BMC Bioinformatics
, vol.7
-
-
Yao, Z.1
Ruzzo, W.L.2
-
26
-
-
33744953911
-
On the individuality of the iris biometric
-
S. Yoon, S.-S. Choi, S. Cha, Y. Lee, and C. C. Tappert., "On the individuality of the iris biometric," Int. J. Graphics, Vision & Image Proc., vol. 5, pp. 63-70, 2005.
-
(2005)
Int. J. Graphics, Vision & Image Proc.
, vol.5
, pp. 63-70
-
-
Yoon, S.1
Choi, S.-S.2
Cha, S.3
Lee, Y.4
Tappert, C.C.5
-
27
-
-
78650379568
-
Obtaining biometric ROC curves from a non-parametric classifier in a long-text-input keystroke authentication study
-
Pace Univ.
-
R.S. Zack, C.C. Tappert, S. Cha, J. Aliperti, A. Amatya, T. Mariutto, A. Shah, and M. Warren, "Obtaining Biometric ROC Curves from a Non-Parametric Classifier in a Long-Text-Input Keystroke Authentication Study," CSIS Tech. Report 268, Pace Univ., 2009.
-
(2009)
CSIS Tech. Report 268
-
-
Zack, R.S.1
Tappert, C.C.2
Cha, S.3
Aliperti, J.4
Amatya, A.5
Mariutto, T.6
Shah, A.7
Warren, M.8
|