-
2
-
-
84871991960
-
-
Last accessed in Mar, 2012
-
Babara and D. P. Mikkelson. Snopes. http://www.snopes.com/critters/wild/ frogboil.asp. Last accessed in Mar, 2012.
-
Snopes
-
-
Babara1
Mikkelson, D.P.2
-
4
-
-
84855230119
-
The frogboiling attack: Limitations of secure network coordinate systems
-
nov
-
E. Chan-Tin, V. Heorhiadi, N. Hopper, and Y. Kim. The frogboiling attack: Limitations of secure network coordinate systems. ACM Trans. Inf. Syst. Secur., 14(3):27:1-27:23, nov 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.3
-
-
Chan-Tin, E.1
Heorhiadi, V.2
Hopper, N.3
Kim, Y.4
-
5
-
-
37849041688
-
Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation
-
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds. Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation. In International Conference on Spoken Language Processing, 1998.
-
International Conference on Spoken Language Processing, 1998
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
7
-
-
37849027593
-
Continual retraining of keystroke dynamics based authenticator
-
P. Kang, S. Hwang, and S. Cho. Continual retraining of keystroke dynamics based authenticator. In ICB, pages 1203-1211, 2007.
-
(2007)
ICB
, pp. 1203-1211
-
-
Kang, P.1
Hwang, S.2
Cho, S.3
-
9
-
-
78249240878
-
Why did my detector do that?!: Predicting keystroke-dynamics error rates
-
K. Killourhy and R. Maxion. Why did my detector do that?!: predicting keystroke-dynamics error rates. In RAID, pages 256-276, 2010.
-
(2010)
RAID
, pp. 256-276
-
-
Killourhy, K.1
Maxion, R.2
-
10
-
-
70450014575
-
Comparing anomaly-detection algorithms for keystroke dynamics
-
K. S. Killourhy and R. A. Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In DSN, pages 125-134, 2009.
-
(2009)
DSN
, pp. 125-134
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
11
-
-
0038343934
-
Information fusion in biometrics
-
A. Ross and A. Jain. Information fusion in biometrics. Pattern Recognition Letters, 24:2115-2125, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 2115-2125
-
-
Ross, A.1
Jain, A.2
-
12
-
-
71749112415
-
Exploiting the doddington zoo effect in biometric fusion
-
sept.
-
A. Ross, A. Rattani, and M. Tistarelli. Exploiting the doddington zoo effect in biometric fusion. In BTAS '09., pages 1-7, sept. 2009.
-
(2009)
BTAS '09
, pp. 1-7
-
-
Ross, A.1
Rattani, A.2
Tistarelli, M.3
-
13
-
-
80054784859
-
Using global knowledge of users' typing traits to attack keystroke biometrics templates
-
A. Serwadda, V. V. Phoha, and A. Kiremire. Using global knowledge of users' typing traits to attack keystroke biometrics templates. In MMSec'11, pages 51-60, 2011.
-
(2011)
MMSec'11
, pp. 51-60
-
-
Serwadda, A.1
Phoha, V.V.2
Kiremire, A.3
-
14
-
-
84871972472
-
Robustness of Keystroke- Dynamics based biometrics against synthetic forgeries
-
Oct.
-
D. Stefan, X. Shu, and D. D. Yao. Robustness of Keystroke- Dynamics based biometrics against synthetic forgeries. Computers & Security, Oct. 2011.
-
(2011)
Computers & Security
-
-
Stefan, D.1
Shu, X.2
Yao, D.D.3
-
16
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. Botgraph: Large scale spamming botnet detection. In NSDI, pages 321-334, 2009.
-
(2009)
NSDI
, pp. 321-334
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|