-
1
-
-
84862077375
-
-
May, 27 Oct
-
A.A.E. Ahmed, I. Traore, "A Statistical Model for Biometric Verification", pp. 141-161, May, 2006, available from: http://www.isot.ece. uvic.ca/publications/behavioralbiometrics/chapter07-3.pdf (27 Oct. 2011)
-
(2006)
A Statistical Model for Biometric Verification
, pp. 141-161
-
-
Ahmed, A.A.E.1
Traore, I.2
-
2
-
-
34547965365
-
A new biometrie technology based on mouse dynamics
-
DOI 10.1109/TDSC.2007.70207
-
A.A.E. Ahmed, I. Traore, "A New Biometric Technology Based on Mouse Dynamics", IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 3, pp. 165-179, July-September, 2007. (Pubitemid 47274809)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
3
-
-
0003802343
-
-
Wadsworth International Group, Belmont, Calif., U.S.A
-
L. Breiman, J.H. Friedman, R.A. Olshen, and C.J. Stone, "Classification and Regression Trees", : Wadsworth International Group, Belmont, Calif., U.S.A.,1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
5
-
-
70349158996
-
Game bot identification based on manifold learning
-
Worcester, Massachusetts, USA, Oct
-
K.-T. Chen, H.-K. Pao, H.-C. Chang, "Game Bot Identification Based on Manifold Learning", 7th Workshop on Network and Systems Support for Games (NetGames), Worcester, Massachusetts, USA, Oct. 2008, pp. 21-22.
-
(2008)
7th Workshop on Network and Systems Support for Games (NetGames)
, pp. 21-22
-
-
Chen, K.-T.1
Pao, H.-K.2
Chang, H.-C.3
-
6
-
-
84860605061
-
Game bot detection based on avatar trajectory
-
Pittsburgh, USA, Sep
-
K.-T. Chen, A. Liao, H.-K. Pao, H.-H. Chu, "Game Bot Detection Based on Avatar Trajectory", 7th International Conference on Entertainment Computing, Pittsburgh, USA, Sep. 2008, pp. 25-27.
-
(2008)
7th International Conference on Entertainment Computing
, pp. 25-27
-
-
Chen, K.-T.1
Liao, A.2
Pao, H.-K.3
Chu, H.-H.4
-
7
-
-
0003893616
-
Requirements and model for IDES-A real-time intrusion detection system
-
SRI International, Menlo Park, CA
-
D.E. Denning and P.G. Neumann. "Requirements and model for IDES-A real-time intrusion detection system," Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1985.
-
(1985)
Technical Report, Computer Science Laboratory
-
-
Denning, D.E.1
Neumann, P.G.2
-
8
-
-
0141613219
-
Java-based internet biometric authentication system
-
R.A.J. Everitt, P.W. McOwan, "Java-Based Internet Biometric Authentication System", IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1166-1172, 2003.
-
(2003)
IEEE Trans. on Pattern Analysis and Machine Intelligence
, vol.25
, Issue.9
, pp. 1166-1172
-
-
Everitt, R.A.J.1
McOwan, P.W.2
-
9
-
-
24144482798
-
Biometrics: No silver bullets
-
DOI 10.1016/S1361-3723(05)70243-8, PII S1361372305702438
-
S. Furnell, N. Clarke, "Biometrics: no silver bullets", Computer Fraud & Security, pp. 9-14, Aug. 2005. (Pubitemid 41230431)
-
(2005)
Computer Fraud and Security
, vol.2005
, Issue.8
, pp. 9-14
-
-
Furnell, S.1
Clarke, N.2
-
10
-
-
35248816860
-
A user authentication technic using a web interaction monitoring system
-
H. Gamboa, A. Fred, "A User Authentication Technic Using a Web Interaction Monitoring System", Lecture Notes in Computer Science (Pattern Recognition and Image Analysis), vol. 2652, pp. 246-254, 2003.
-
(2003)
Lecture Notes in Computer Science (Pattern Recognition and Image Analysis)
, vol.2652
, pp. 246-254
-
-
Gamboa, H.1
Fred, A.2
-
12
-
-
3042781449
-
Toward reliable user authentication through biometrics
-
May
-
V.M. Jr., Z. Riha, "Toward reliable user authentication through biometrics", IEEE Security and Privacy, vol. 1, no. 3, pp. 45-49, May 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 45-49
-
-
Riha Jr., V.M.Z.1
-
13
-
-
48749109333
-
Particle swarm optimization for parameter determination and feature selection of support vector machines
-
S. Lin, K. Ying, S. Chen, Z. Lee," Particle swarm optimization for parameter determination and feature selection of support vector machines". Expert system with applications. vol.35, no.4, pp.1817-1824, 2008.
-
(2008)
Expert System with Applications
, vol.35
, Issue.4
, pp. 1817-1824
-
-
Lin, S.1
Ying, K.2
Chen, S.3
Lee, Z.4
-
14
-
-
44349091503
-
Inverse biometrics for mouse dynamics
-
DOI 10.1142/S0218001408006363, PII S0218001408006363
-
A. Nazar, I. Traore, A.A. E. Ahmed, "Inverse Biometrics for Mouse Dynamics", International Journal of Pattern Recognition and Artificial Intelligence, vol. 22, no. 3, pp. 461-495, 2008. (Pubitemid 351730130)
-
(2008)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.22
, Issue.3
, pp. 461-495
-
-
Nazar, A.1
Traore, I.2
Ahmed, A.A.E.3
-
15
-
-
33846291754
-
BIOGLYPH: Biometric identification in pervasive environments
-
DOI 10.1109/ISM.2005.41, 1565906, Proceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005
-
D.V. Popel, E.I. Popel, "BIOGLYPH: biometric identification in pervasive environments", Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM'05), pp. 713-718, 2005. (Pubitemid 46110760)
-
(2005)
Proceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005
, vol.2005
, pp. 713-718
-
-
Popel, D.V.1
Popel, E.I.2
-
16
-
-
20444496997
-
User re-authentication via mouse movements
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
M. Pusara, C.E. Brodley, "User re-authentication via mouse movements", Proc. ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC'04), Washington, DC, USA, Oct. 29 2004, pp. 1-8. (Pubitemid 40821167)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
17
-
-
84862071901
-
A behavioral biometric approach based on standardized resolution in mouse dynamics
-
April
-
S.B. E. Raj, A.T. Santhosh, "A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics", International Journal of Computer Science and Network Security (IJCSNS), vol.9, no.4, pp. 370-377, April 2009.
-
(2009)
International Journal of Computer Science and Network Security (IJCSNS)
, vol.9
, Issue.4
, pp. 370-377
-
-
Raj, S.B.E.1
Santhosh, A.T.2
-
18
-
-
85192902604
-
A survey of user authentication based on mouse dynamics
-
K. Revett, H. Jahankhani, S.T. de Magalhães, H. M.D. Santos, "A Survey of User Authentication Based on Mouse Dynamics", Communications in Computer and Information Science (Global E-Security), vol. 12, pp. 210-219, 2008.
-
(2008)
Communications in Computer and Information Science (Global E-Security)
, vol.12
, pp. 210-219
-
-
Revett, K.1
Jahankhani, H.2
De Magalhães, S.T.3
Santos, H.M.D.4
-
19
-
-
70449504999
-
Feature analysis of mouse dynamics in identity authentication and monitoring
-
C. Shen, Z. Cai, X. Guan, H. Sha, J. Du, "Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring", IEEE International Conference on Communications (ICC '09), 2009, pp. 1-5.
-
(2009)
IEEE International Conference on Communications (ICC '09)
, pp. 1-5
-
-
Shen, C.1
Cai, Z.2
Guan, X.3
Sha, H.4
Du, J.5
-
20
-
-
33947499205
-
Continuous verification using multimodal biometrics
-
DOI 10.1109/TPAMI.2007.1010, Special issue on Biometrics: Progress and Directions
-
T. Sim, S. Zhang, R. Janakiraman, S. Kumar, "Continuous Verification Using Multimodal Biometrics", IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, April 2007. (Pubitemid 46464408)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 687-700
-
-
Sim, T.1
Zhang, S.2
Janakiraman, R.3
Kumar, S.4
-
22
-
-
34249086815
-
Dimensionality reduction of multimodal labeled data by local fisher discriminant analysis
-
M. Sugiyama, "Dimensionality reduction of multimodal labeled data by local Fisher discriminant analysis", Journal of Machine Learning Research, vol.8, pp. 1027-1061, May 2007. (Pubitemid 46798409)
-
(2007)
Journal of Machine Learning Research
, vol.8
, pp. 1027-1061
-
-
Sugiyama, M.1
-
23
-
-
38149051403
-
Dynamic mouse speed scheme design based on trajectory analysis
-
K.-H. Tang, Y.-H. Lee, "Dynamic Mouse Speed Scheme Design Based on Trajectory Analysis", Lecture Notes in Computer Science (Ergonomics and Health Aspects of Work with Computers) (HCII 2007), vol. 4566, pp. 329-338, 2007.
-
(2007)
Lecture Notes in Computer Science (Ergonomics and Health Aspects of Work with Computers) (HCII 2007)
, vol.4566
, pp. 329-338
-
-
Tang, K.-H.1
Lee, Y.-H.2
-
24
-
-
0034704229
-
A global geometric framework for nonlinear dimensionality reduction
-
DOI 10.1126/science.290.5500.2319
-
J.B. Tenenbaum, V. de Silva, J.C. Langford, "A Global Geometric Framework for Nonlinear Dimensionality Reduction ", Science, vol. 290, no. 5500, pp. 2319-2323, 2000. (Pubitemid 32041577)
-
(2000)
Science
, vol.290
, Issue.5500
, pp. 2319-2323
-
-
Tenenbaum, J.B.1
De Silva, V.2
Langford, J.C.3
-
25
-
-
71749100206
-
Mouse movements biometric identification: A feasibility study
-
CSIS, Pace University, May 4th
-
A. Weiss, A. Ramapanicker, P. Shah, S. Noble, L. Immohr, "Mouse Movements Biometric Identification: A Feasibility Study", Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 4th 2007, pp. 1-8.
-
(2007)
Proceedings of Student/Faculty Research Day
, pp. 1-8
-
-
Weiss, A.1
Ramapanicker, A.2
Shah, P.3
Noble, S.4
Immohr, L.5
-
27
-
-
84956859871
-
A user identification system using signature written with mouse
-
A.F. Syukri, E. Okamoto, M. Mambo, "A User Identification System Using Signature Written with Mouse", Lecture Notes in Computer Science (Information Security and Privacy) (ACISP'98), vol. 1438, pp. 403-414, 1998. (Pubitemid 128101802)
-
(1998)
Lecture Notes in Computer Science
, Issue.1438
, pp. 403-414
-
-
Syukri, A.F.1
Okamoto, E.2
Mambo, M.3
|