-
1
-
-
33745215614
-
Keystroke analysis of free text
-
DOI 10.1145/1085126.1085129
-
D. Gunetti and C. Picardi, "Keystroke analysis of free text," ACM Trans. Inf. Syst. Secur., vol. 8, no. 3, pp. 312-347, Aug. 2005. (Pubitemid 43906388)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
2
-
-
0030675109
-
Authentication via keystroke dynamics
-
Security, NY, USA
-
F. Monrose and A. Rubin, "Authentication via keystroke dynamics," in Proc. 4th ACM Conf. Computer and Commun. Security, NY, USA, 1997, pp. 48-56.
-
(1997)
Proc. 4th ACM Conf. Computer and Commun
, pp. 48-56
-
-
Monrose, F.1
Rubin, A.2
-
3
-
-
33745217815
-
A preliminary investigation of user authentication using continuous keystroke analysis
-
Nevada, USA
-
P. Dowland, H. Singh, and S. Furnell, "A preliminary investigation of user authentication using continuous keystroke analysis," in Proc. 8th IFIP Conf. Infor. Security Mgmt. and Small Sys. Security, Nevada, USA, 2001.
-
(2001)
Proc. 8th IFIP Conf. Infor. Security Mgmt. and Small Sys. Security
-
-
Dowland, P.1
Singh, H.2
Furnell, S.3
-
4
-
-
79951599175
-
Continuous verification using keystroke dynamics
-
Los Alamitos, CA, USA
-
T. Shimshon, R. Moskovitch, L. Rokach, and Y. Elovici, "Continuous verification using keystroke dynamics," in Proc. Int. Conf. Computational Intel. and Security, Los Alamitos, CA, USA, 2010, pp. 411-415.
-
(2010)
Proc. Int. Conf. Computational Intel. and Security
, pp. 411-415
-
-
Shimshon, T.1
Moskovitch, R.2
Rokach, L.3
Elovici, Y.4
-
5
-
-
78650394514
-
Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method
-
R. S. Zack, C. C. Tappert, and S.-H. Cha, "Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method," in Proc. 2010 Fourth IEEE Intl. Conf. Theory Applications and Systems (BTAS), 2010, pp. 1-6.
-
(2010)
Proc. 2010 Fourth IEEE Intl. Conf. Theory Applications and Systems (BTAS)
, pp. 1-6
-
-
Zack, R.S.1
Tappert, C.C.2
Cha, S.-H.3
-
6
-
-
84856098360
-
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
-
Oct. 11-13
-
A. Messerman, T. Mustafić, S. A. Camtepe, and S. Albayrak, "Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics," in Proc. IEEE Int. Joint Conf. Biometrics (IJCB 11), Oct. 11-13, 2011, pp. 1-8.
-
(2011)
Proc. IEEE Int. Joint Conf. Biometrics (IJCB 11)
, pp. 1-8
-
-
Messerman, A.1
Mustafić, T.2
Camtepe, S.A.3
Albayrak, S.4
-
7
-
-
84874583796
-
-
SendInput [Online]. Available: msdn.microsoft.com
-
SendInput [Online]. Available: msdn.microsoft.com
-
-
-
-
8
-
-
84874593864
-
-
xsendkeycode
-
xsendkeycode [Online]. Available: http://manpages.ubuntu.com/man-pages/ gutsy/man8/xsendkeycode.8.html
-
-
-
-
9
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
Jan.
-
U. Uludag and A. K. Jain, "Attacks on biometric systems: A case study in fingerprints," in Proc. SPIE Security, Steganography and Watermarking of Multimedia Contents VI, Jan. 2004, vol. 5306, pp. 622-633.
-
(2004)
Proc. SPIE Security, Steganography and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 622-633
-
-
Uludag, U.1
Jain, A.K.2
-
11
-
-
84874613894
-
-
Ph.D. dissertation, Louisiana Tech University, Ruston, LA, USA
-
S. Joshi, "Naive Bayes and Similarity Based Methods for Identi fying Computer Users Using Keystroke Patterns," Ph.D. dissertation, Louisiana Tech University, Ruston, LA, USA, 2009.
-
(2009)
Naive Bayes and Similarity Based Methods for Identi Fying Computer Users Using Keystroke Patterns
-
-
Joshi, S.1
-
12
-
-
80054932298
-
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
-
Colorado, USA, Jun.
-
K. A. Rahman, K. S. Balagani, and V. V. Phoha, "Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes," in Proc. 2011 IEEE Computer Vision and Pattern Recognition Workshops (CVPRW), Colorado, USA, Jun. 2011, pp. 31-38.
-
(2011)
Proc. 2011 IEEE Computer Vision and Pattern Recognition Workshops (CVPRW)
, pp. 31-38
-
-
Rahman, K.A.1
Balagani, K.S.2
Phoha, V.V.3
-
13
-
-
13244284703
-
User authentication through typing biometrics features
-
DOI 10.1109/TSP.2004.839903
-
L. C. F. Araujo, L. H. R. Sucupira, M. Lizarraga, L. Ling, and J. B. T. Yabu-uti, "User authentication through typing biometrics features," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 851-855, Feb. 2005. (Pubitemid 40181779)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.II2
, pp. 851-855
-
-
Araujo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizarraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
14
-
-
78249240878
-
Why did my detector do that?!: Predicting keystroke-dynamics error rates
-
K. Killourhy and R. Maxion, "Why did my detector do that?!: Predicting keystroke-dynamics error rates," in Recent Adv. in Intrusion Detection, Canada, 2010, pp. 256-276.
-
(2010)
Recent Adv. in Intrusion Detection, Canada
, pp. 256-276
-
-
Killourhy, K.1
Maxion, R.2
-
15
-
-
84855983623
-
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
-
Feb.
-
D. Stefan, X. Shu, and D. Yao, "Robustness of keystroke-dynamics based biometrics against synthetic forgeries," Comput. Security, vol. 31, no. 1, pp. 109-121, Feb. 2012.
-
(2012)
Comput. Security
, vol.31
, Issue.1
, pp. 109-121
-
-
Stefan, D.1
Shu, X.2
Yao, D.3
-
16
-
-
80054784859
-
Using global knowledge of users' typing traits to attack keystroke biometrics templates
-
New York, NY, USA
-
A. Serwadda, V. V. Phoha, and A. Kiremire, "Using global knowledge of users' typing traits to attack keystroke biometrics templates," in Proc. 13th ACM Workshop on Multimedia and Security, New York, NY, USA, 2011, pp. 51-60.
-
Proc. 13th ACM Workshop on Multimedia and Security
, Issue.2011
, pp. 51-60
-
-
Serwadda, A.1
Phoha, V.V.2
Kiremire, A.3
-
17
-
-
35148815257
-
Forgery quality and its implications for behavioral biometric security
-
DOI 10.1109/TSMCB.2007.903539, Special Issue on Recent Advances in Biometric Systems
-
L. Ballard, D. Lopresti, and F. Monrose, "Forgery quality and its implications for behavioral biometric security," IEEE Trans. Syst., Man, Cybern. B, vol. 37, no. 5, pp. 1107-1118, Oct. 2007. (Pubitemid 47534580)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1107-1118
-
-
Ballard, L.1
Lopresti, D.2
Monrose, F.3
-
18
-
-
34548086500
-
Spoof attacks on gait authentication system
-
DOI 10.1109/TIFS.2007.902030
-
D. Gafurov, E. Snekkenes, and P. Bours, "Spoof attacks on gait authentication system," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 491-502, Sep. 2007. (Pubitemid 47290583)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 491-502
-
-
Gafurov, D.1
Snekkenes, E.2
Bours, P.3
-
19
-
-
70349297048
-
Towards practical biometric key generation with randomized biometric templates
-
New York, NY, USA
-
L. Ballard, S. Kamara, F. Monrose, and M. K. Reiter, "Towards practical biometric key generation with randomized biometric templates," in Proc. 15th ACM Conf. Computer and Communications Security, New York, NY, USA, 2008, pp. 235-244.
-
(2008)
Proc. 15th ACM Conf. Computer and Communications Security
, pp. 235-244
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
Reiter, M.K.4
-
20
-
-
67549137969
-
Evaluating the security of handwriting biometrics
-
L. Ballard, D. Lopresti, and F. Monrose, "Evaluating the security of handwriting biometrics," in Proc. 10th Int. Workshop on the Foundations of Handwriting Recognition, 2006, vol. 15, pp. 461-466.
-
(2006)
Proc. 10th Int. Workshop on the Foundations of Handwriting Recognition
, vol.15
, pp. 461-466
-
-
Ballard, L.1
Lopresti, D.2
Monrose, F.3
-
21
-
-
84876806083
-
Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing
-
California, USA
-
L. Ballard, F. Monrose, and D. Lopresti, "Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing," in Proc. 15th Conf. USENIX Security Symp., California, USA, 2006, vol. 15.
-
(2006)
Proc. 15th Conf. USENIX Security Symp
, vol.15
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.3
-
22
-
-
78249254100
-
-
Anti-Phishing Working Group Feb. 2007
-
Anti-Phishing Working Group, Phishing Activity Trends Report for the Month of February, 2007 Feb. 2007 [Online]. Available: www.an-tiphishing.org/ reports/apwg-report-february-2007.pdf
-
(2007)
Phishing Activity Trends Report for the Month of February
-
-
-
25
-
-
35248819748
-
Combining face and iris biometrics for identity verification
-
Y. Wang, T. Tan, and A. Jain, "Combining face and iris biometrics for identity verification," in Proc. Fourth Int. Conf. AVBPA, 2003, pp. 805-813.
-
(2003)
Proc. Fourth Int. Conf. AVBPA
, pp. 805-813
-
-
Wang, Y.1
Tan, T.2
Jain, A.3
-
26
-
-
25144471298
-
Score normalization in multimodal biometric systems
-
DOI 10.1016/j.patcog.2005.01.012, PII S0031320305000592
-
A. Jain, K. Nandakumar, and A. Ross, "Score normalization in multimodal biometric systems," Pattern Recognit., vol. 38, no. 12, pp. 2270-2285, Dec. 2005. (Pubitemid 41336698)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2270-2285
-
-
Jain, A.1
Nandakumar, K.2
Ross, A.3
-
27
-
-
12344252278
-
English letter frequencies and their applications: Part II - Digraph frequencies
-
D. R. Ridley and M. Lively, "English letter frequencies and their applications: Part ii-digraph frequencies," Psychol. Reports, vol. 95, no. 3, pp. 787-794, Jul. 2004. (Pubitemid 40131912)
-
(2004)
Psychological Reports
, vol.95
, Issue.I3
, pp. 787-794
-
-
Ridley, D.R.1
Lively, B.M.2
|