메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC AUTHENTICATION SYSTEM; BIOMETRIC SYSTEMS; CLASSIFICATION METHODS; CLOSED SYSTEMS; FEATURE EXTRACTOR; JAVA APPLET; K-NEAREST NEIGHBORS; PATTERN CLASSIFIER; RECEIVER OPERATING CHARACTERISTIC CURVES; THREE COMPONENT;

EID: 78650394514     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BTAS.2010.5634492     Document Type: Conference Paper
Times cited : (29)

References (27)
  • 4
    • 78650314350 scopus 로고    scopus 로고
    • Simulating ROC curves for multivariate biometric verification models
    • S. Cha and C.C. Tappert, "Simulating ROC curves for multivariate biometric verification models," CSIS Tech. Report 267, Pace Univ., 2009.
    • (2009) CSIS Tech. Report 267, Pace Univ.
    • Cha, S.1    Tappert, C.C.2
  • 5
    • 79956152106 scopus 로고    scopus 로고
    • Use of histogram distances in iris authentication
    • Las Vegas
    • S. Choi, S. Yoon, S. Cha, and C.C. Tappert, "Use of histogram distances in iris authentication," Proc. MCSCE-MLMTA, Las Vegas, 2004.
    • (2004) Proc. MCSCE-MLMTA
    • Choi, S.1    Yoon, S.2    Cha, S.3    Tappert, C.C.4
  • 6
    • 0029307876 scopus 로고
    • A k-nearest neighbor classification rule based on Dempster-Shafer Theory
    • T. Denoeux, "A k-nearest neighbor classification rule based on Dempster-Shafer Theory," IEEE Trans. Systems, Man and Cybernetics, vol. 25, pp. 804-813, 1995.
    • (1995) IEEE Trans. Systems, Man and Cybernetics , vol.25 , pp. 804-813
    • Denoeux, T.1
  • 7
    • 36048978381 scopus 로고    scopus 로고
    • The problems of using ROC curve as the sole criterion in positive biometrics identification
    • Y. Du and C.-I. Chang, "The problems of using ROC curve as the sole criterion in positive biometrics identification," Proc. SPIE, v. 6579, 2007.
    • (2007) Proc. SPIE , vol.6579
    • Du, Y.1    Chang, C.-I.2
  • 10
    • 56549092419 scopus 로고    scopus 로고
    • The effect of clock resolution on keystroke dynamics
    • also R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in CS (LNCS), Springer
    • K.S. Killourhy and R.A. Maxion, "The Effect of Clock Resolution on Keystroke Dynamics." 11th Int. Sym. Recent Advances Intrusion Detection (RAID-08), 2008, also R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in CS (LNCS), Vol. 5230, pp. 331-350, Springer.
    • (2008) 11th Int. Sym. Recent Advances Intrusion Detection (RAID-08) , vol.5230 , pp. 331-350
    • Killourhy, K.S.1    Maxion, R.A.2
  • 11
    • 70450014575 scopus 로고    scopus 로고
    • Comparing anomaly-detection algorithms for keystroke dynamics
    • Lisbon, Portugal, 2009, IEEE Computer Society Press, Los Alamitos
    • K.S. Killourhy and R.A. Maxion, "Comparing Anomaly-Detection Algorithms for Keystroke Dynamics." Proc. Int. Conf. Dependable Systems & Networks (DSN-09), pp. 125-134, Lisbon, Portugal, 2009. IEEE Computer Society Press, Los Alamitos, 2009.
    • (2009) Proc. Int. Conf. Dependable Systems & Networks (DSN-09) , pp. 125-134
    • Killourhy, K.S.1    Maxion, R.A.2
  • 12
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighbor classifier for intrusion detection
    • Y. Liao and V.R. Vemuri, "Use of K-Nearest Neighbor Classifier for Intrusion Detection, Computers and Security, v. 21, 2002, pp 439-448.
    • (2002) Computers and Security , vol.21 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 13
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • F. Monrose and A.D. Rubin, Keystroke dynamics as a biometric for authentication," Future Gen. Computer Systems, 16(4), 351-359, 2000.
    • (2000) Future Gen. Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 14
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification," IEEE Security & Privacy, 2(5), 40-47, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 16
    • 78650403533 scopus 로고    scopus 로고
    • IAM online: Hot topics and current issues in identity and access management - Provisioning remote users and the impact of the HEOA on distance education
    • March
    • M. Scheible and L. McNabb, "IAM Online: Hot Topics and Current Issues in Identity and Access Management - Provisioning Remote Users and the Impact of the HEOA on Distance Education," Web Conference, March 2010, http://www.incommonfederation.org/docs/iamonline/ Remote%20Credentialing%20IAM%20Online%20-%20Final.pdf.
    • (2010) Web Conference
    • Scheible, M.1    McNabb, L.2
  • 17
    • 84987814715 scopus 로고    scopus 로고
    • accessed 2010
    • Scholarpedia, "K-nearest neighbor," http://www.scholarpedia. org/article/Knearest-neighbor, accessed 2010.
    • K-nearest Neighbor
  • 19
    • 0030866323 scopus 로고    scopus 로고
    • Receiver operating characteristic studies and measurement errors
    • M.C.S. Sukhatme, "Receiver Operating Characteristic Studies and Measurement Errors," Biometrics, vol. 53, pp. 823-837, 1997.
    • (1997) Biometrics , vol.53 , pp. 823-837
    • Sukhatme, M.C.S.1
  • 21
  • 23
    • 84871870853 scopus 로고    scopus 로고
    • accessed 2010
    • Wikipedia, "k-nearest neighbor algorithm," http://en.wikipedia. org/wiki/Knearest-neighbor-algorithm, accessed 2010.
    • K-nearest Neighbor Algorithm
  • 24
    • 84891392116 scopus 로고    scopus 로고
    • accessed 2010
    • Wikipedia, "Receiver operating characteristic," http://en.wikipedia.org/wiki/Receiver-operating-characteristic, accessed 2010.
    • Receiver Operating Characteristic
  • 25
    • 33947313355 scopus 로고    scopus 로고
    • A Regression-based K nearest neighbor algorithm for gene function prediction from heterogeneous data
    • Z. Yao and W.L. Ruzzo, A Regression-based K nearest neighbor algorithm for gene function prediction from heterogeneous data," BMC Bioinformatics, 7, 2006.
    • (2006) BMC Bioinformatics , vol.7
    • Yao, Z.1    Ruzzo, W.L.2
  • 27


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.