-
3
-
-
35248886709
-
Using an active shape structural model for biometric sketch recognition
-
S. Al-Zubi, A. Bromme, K. Tonnies, Using an active shape structural model for biometric sketch recognition, in: Proceedings of DAGM, 2003, pp. 187-195.
-
(2003)
Proceedings of DAGM
, pp. 187-195
-
-
Al-Zubi, S.1
Bromme, A.2
Tonnies, K.3
-
4
-
-
67549137969
-
Evaluating the security of handwriting biometrics
-
La Baule, France
-
L. Ballard, D. Lopresti, F. Monrose, Evaluating the security of handwriting biometrics, in: The 10th International Workshop on Frontiers in Handwriting Recognition (IWFHR '06), La Baule, France, 2006.
-
(2006)
The 10th International Workshop on Frontiers in Handwriting Recognition (IWFHR '06)
-
-
Ballard, L.1
Lopresti, D.2
Monrose, F.3
-
8
-
-
0035478854
-
Random forests
-
DOI 10.1023/A:1010933404324
-
L. Breiman Random forests Machine Learning 45 1 2001 5 32 (Pubitemid 32933532)
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
10
-
-
0005327658
-
Web-based keystroke dynamics identity verification using neural network
-
S. Cho, C. Han, D.H. Han, and H.I. Kim Web-based keystroke dynamics identity verification using neural network Journal of Organizational Computing and Electronic Commerce 10 4 2000 295 307
-
(2000)
Journal of Organizational Computing and Electronic Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.H.3
Kim, H.I.4
-
12
-
-
77958150424
-
An adaptive classification system for video-based face recognition
-
in press (Corrected Proof, Available online 6 March)
-
J.-F. Connolly, E. Granger, R. Sabourin, An adaptive classification system for video-based face recognition, Information Sciences, in press (Corrected Proof, Available online 6 March 2010).
-
(2010)
Information Sciences
-
-
Connolly, J.-F.1
Granger, E.2
Sabourin, R.3
-
13
-
-
84855983623
-
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
-
D. Stefan, X. Shu, and D. Yao Robustness of keystroke-dynamics based biometrics against synthetic forgeries Computers & Security 31 1 2012 109 121
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 109-121
-
-
Stefan, D.1
Shu, X.2
Yao, D.3
-
14
-
-
33750965925
-
Accent classification in speech
-
DOI 10.1109/AUTOID.2005.10, 1544415, Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
-
S. Deshpande, S. Chikkerur, V. Govindaraju, Accent classification in speech, Fourth IEEE Workshop on Automatic Identification Advanced Technologies, 17-18 October, 2005, pp. 139-143. (Pubitemid 44733964)
-
(2005)
Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, vol.2005
, pp. 139-143
-
-
Deshpande, S.1
Chikkerur, S.2
Govindaraju, V.3
-
15
-
-
26444499551
-
Multi-modal person recognition for vehicular applications
-
Multiple Classifier Systems: 6th International Workshop, MCS 2005. Proceedings
-
H. Erdogan, A. Ercil, H.K. Ekenel, S.Y. Bilgin, I. Eden, M. Kirisci, and H. Abut Multi-modal person recognition for vehicular applications N.C. Oza, MCS, LNCS vol. 351 2005 Springer Heidelberg 366 375 (Pubitemid 41422635)
-
(2005)
Lecture Notes in Computer Science
, vol.3541
, pp. 366-375
-
-
Erdogan, H.1
Ercil, A.2
Ekenel, H.K.3
Bilgin, S.Y.4
Eden, I.5
Kirisci, M.6
Abut, H.7
-
16
-
-
33646007315
-
Multimodal person recognition for human-vehicle interaction
-
E. Erzin, Y. Yemez, A.M. Tekalp, A. Eril, H. Erdogan, and H. Abut Multimodal person recognition for human-vehicle interaction IEEE MultiMedia 13 2 2006 18 31
-
(2006)
IEEE MultiMedia
, vol.13
, Issue.2
, pp. 18-31
-
-
Erzin, E.1
Yemez, Y.2
Tekalp, A.M.3
Eril, A.4
Erdogan, H.5
Abut, H.6
-
18
-
-
67649949220
-
Source code authorship analysis for supporting the cybercrime investigation process
-
G. Frantzeskou, S. Gritzalis, S. MacDonell, Source code authorship analysis for supporting the cybercrime investigation process, in: 1st International Conference on eBusiness and Telecommunication Networks - Security and Reliability in Information Systems and Networks Track (ICETE04), 2004, pp. 85-92.
-
(2004)
1st International Conference on EBusiness and Telecommunication Networks - Security and Reliability in Information Systems and Networks Track (ICETE04)
, pp. 85-92
-
-
Frantzeskou, G.1
Gritzalis, S.2
MacDonell, S.3
-
20
-
-
8844279221
-
Behavioral biometric system based on human computer interaction
-
H. Gamboa, and A. Fred Behavioral biometric system based on human computer interaction Proceedings of SPIE 5404 2004 381 392
-
(2004)
Proceedings of SPIE
, vol.5404
, pp. 381-392
-
-
Gamboa, H.1
Fred, A.2
-
21
-
-
50249102872
-
Webbiometrics: User verification via web interaction
-
H. Gamboa, A.L.N. Fred, A.K. Jain, Webbiometrics: user verification via web interaction, in: Proceedings of Biometrics Symposium, 2007, pp. 1-6.
-
(2007)
Proceedings of Biometrics Symposium
, pp. 1-6
-
-
Gamboa, H.1
Fred, A.L.N.2
Jain, A.K.3
-
22
-
-
84860276435
-
Supervised subspace projections for constructing ensembles of classifiers
-
in press (Corrected Proof, Available online 8 July)
-
N. García-Pedrajas, J. Maudes-Raedo, C. García-Osorio, J.J. Rodríguez-Díez, Supervised subspace projections for constructing ensembles of classifiers, Information Sciences, in press (Corrected Proof, Available online 8 July 2011).
-
(2011)
Information Sciences
-
-
García-Pedrajas, N.1
-
24
-
-
33947528559
-
Performance of biometric quality measures
-
DOI 10.1109/TPAMI.2007.1019, Special issue on Biometrics: Progress and Directions
-
P. Grother, and E. Tabassi Performance of biometric quality measures IEEE Transactions on Pattern Analysis and Machine Intelligence 29 4 2007 531 543 (Pubitemid 46464395)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 531-543
-
-
Grother, P.1
Tabassi, E.2
-
26
-
-
80051980204
-
Homogeneous physio-behavioral visual and mouse-based biometric
-
(Article 12)
-
O. Hamdy, and I. Traoré Homogeneous physio-behavioral visual and mouse-based biometric ACM Transactions on Computer-Human Interaction 18 3 2011 1 30 (Article 12)
-
(2011)
ACM Transactions on Computer-Human Interaction
, vol.18
, Issue.3
, pp. 1-30
-
-
Hamdy, O.1
Traoré, I.2
-
27
-
-
79956024974
-
On using mouse movements as a biometric
-
S. Hashia, C. Pollett, M. Stamp, On using mouse movements as a biometric, in: Proceeding in the International Conference on Computer Science and its Applications, vol. 1, 2005.
-
(2005)
Proceeding in the International Conference on Computer Science and Its Applications
, vol.1
-
-
Hashia, S.1
Pollett, C.2
Stamp, M.3
-
29
-
-
10044236375
-
Biometrics: A grand challenge
-
A.K. Jain, S. Pankanti, S. Prabhakar, L. Hong, A. Ross, Biometrics: A grand challenge, Proceedings of International Conference on Pattern Recognition, vol. 2, 2004, pp. 935-942.
-
(2004)
Proceedings of International Conference on Pattern Recognition
, vol.2
, pp. 935-942
-
-
Jain, A.K.1
Pankanti, S.2
Prabhakar, S.3
Hong, L.4
Ross, A.5
-
30
-
-
84867777345
-
Inductive inference of chess player strategy
-
A.R. Jansen, D.L. Dowe, G.E. Farr, Inductive inference of chess player strategy, in: Proceedings of the 6th Pacific Rim International Conference on Artificial Intelligence (PRICAI'2000), 2000, pp. 61-71.
-
(2000)
Proceedings of the 6th Pacific Rim International Conference on Artificial Intelligence (PRICAI'2000)
, pp. 61-71
-
-
Jansen, A.R.1
Dowe, D.L.2
Farr, G.E.3
-
31
-
-
79956040654
-
On mouse dynamics as a behavioral biometric for authentication
-
March
-
Z. Jorgensen, T. Yu, On mouse dynamics as a behavioral biometric for authentication, in: Proceedings of the Sixth ACM Symposium on Information, Computer, and Communications Security (AsiaCCS), March 2011.
-
(2011)
Proceedings of the Sixth ACM Symposium on Information, Computer, and Communications Security (AsiaCCS)
-
-
Jorgensen, Z.1
Yu, T.2
-
32
-
-
4344637549
-
Identification of humans using gait
-
A. Kale, A. Sundaresan, A.N. Rajagopalan, N. Cuntoor, A. Roychowdhury, V. Kruger, and R. Chellappa Identification of humans using gait IEEE Transactions on Image Processing 13 9 2004 1163 1173
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.9
, pp. 1163-1173
-
-
Kale, A.1
Sundaresan, A.2
Rajagopalan, A.N.3
Cuntoor, N.4
Roychowdhury, A.5
Kruger, V.6
Chellappa, R.7
-
33
-
-
80052042991
-
Personal identification using multibiometrics rank-level fusion
-
A. Kumar, and S. Shekhar Personal identification using multibiometrics rank-level fusion IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 41 5 2011 743 752
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.41
, Issue.5
, pp. 743-752
-
-
Kumar, A.1
Shekhar, S.2
-
34
-
-
0030721345
-
Computer-access authentication with neural network based keystroke identity verification
-
Houston, Texas, June 09-12
-
D.-T. Lin, Computer-access authentication with neural network based keystroke identity verification, in: Proceedings of IEEE International Conference on Neural Networks, Houston, Texas, June 09-12, vol. 1, 1997, pp. 174-178.
-
(1997)
Proceedings of IEEE International Conference on Neural Networks
, vol.1
, pp. 174-178
-
-
Lin, D.-T.1
-
35
-
-
79959580052
-
NABS: Novel approaches for biometric systems
-
M. De Marsico, M. Nappi, D. Riccio, and G. Tortora NABS: novel approaches for biometric systems IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 41 4 2011 481 493
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.41
, Issue.4
, pp. 481-493
-
-
De Marsico, M.1
Nappi, M.2
Riccio, D.3
Tortora, G.4
-
37
-
-
20444496997
-
User re-authentication via mouse-movements
-
ACM Washington, DC, USA
-
M. Pusara, and C.E. Brodley User re-authentication via mouse-movements Proceedings of the ACM Workshop Visualization and Data Mining for Computer Security, (VizSEC/DMSEC 2004) 2004 ACM Washington, DC, USA 1 8
-
(2004)
Proceedings of the ACM Workshop Visualization and Data Mining for Computer Security, (VizSEC/DMSEC 2004)
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
40
-
-
85192902604
-
A survey of user authentication based on mouse dynamics
-
London, UK, June
-
K. Revett, H. Jahankhani, S.T. de Magalhes, H.M.D. Santos, A survey of user authentication based on mouse dynamics, in: Proceedings of 4th International Conference on Global E-Security, Communications in Computer and Information Science, vol. 12, London, UK, June 2008, pp. 210-219.
-
(2008)
Proceedings of 4th International Conference on Global E-Security, Communications in Computer and Information Science
, vol.12
, pp. 210-219
-
-
Revett, K.1
Jahankhani, H.2
De Magalhes, S.T.3
Santos, H.M.D.4
-
41
-
-
38349065906
-
Developing a keystroke dynamics based agent using rough sets
-
September 19-22, University of Technology of Compigne, France
-
K. Revett, P.S. Magalhães, H.D. Santos, Developing a keystroke dynamics based agent using rough sets, in: IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, September 19-22, University of Technology of Compigne, France, 2005, pp. 56-61.
-
(2005)
IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology
, pp. 56-61
-
-
K. Revett1
-
42
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M. Schonlau, W. DuMouchel, H. Ju, A.F. Karr, M. Theus, and Y. Vardi Computer intrusion: detecting masquerades Statistical Science 16 2001 1 17
-
(2001)
Statistical Science
, vol.16
, pp. 1-17
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
45
-
-
67650697862
-
-
Mathematical Methods, Models and Architectures for Computer Networks Security Springer-Verlag
-
S.J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, C.W. Hu, and W. Hu A Behavior-based Approach to Securing Email Systems Mathematical Methods, Models and Architectures for Computer Networks Security 2003 Springer-Verlag
-
(2003)
A Behavior-based Approach to Securing Email Systems
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.W.5
Hu, W.6
-
46
-
-
84860296784
-
-
Columbia University
-
S.J. Stolfo, C.W. Hu, W.J. Li, S. Hershkop, K. Wang, O. Nimeskern, Combining Behavior Models to Secure Email Systems, Technical Report, Columbia University, 2003. .
-
(2003)
Combining Behavior Models to Secure Email Systems, Technical Report
-
-
Stolfo, S.J.1
Hu, C.W.2
Li, W.J.3
Hershkop, S.4
Wang, K.5
Nimeskern, O.6
-
47
-
-
0042367634
-
Mining E-mail content for author identification forensics
-
O.D. Vel, A. Anderson, M. Corney, and G. Mohay Mining email content for author identification forensics ACM SIGMOD Record: Special Section on Data Mining for Intrusion Detection and Threat Analysis 30 4 2001 55 64 (Pubitemid 33720999)
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
48
-
-
84860263372
-
Biometric identification using song-based eye blink patterns
-
Las Vegas, NV
-
T. Westeyn, P. Pesti, K. Park, T. Starner, Biometric identification using song-based eye blink patterns, Human Computer Interaction International (HCII), Las Vegas, NV, 2005.
-
(2005)
Human Computer Interaction International (HCII)
-
-
Westeyn, T.1
Pesti, P.2
Park, K.3
Starner, T.4
-
51
-
-
0027457620
-
Receiver-operating characteristic (ROC) plots: A fundamental evaluation tool in clinical medicine
-
M.H. Zweig, and G. Campbell Receiver-operating characteristic (roc) plots: a fundamental evaluation tool in clinical medicine Clinical Chemistry 39 4 1993 561 577 (Pubitemid 23118304)
-
(1993)
Clinical Chemistry
, vol.39
, Issue.4
, pp. 561-577
-
-
Zweig, M.H.1
Campbell, G.2
|