-
2
-
-
78650165017
-
User authentication through keystroke dynamics
-
Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security 5(4), 367-397 (2002)
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
3
-
-
0000588294
-
Improving the generalization properties of radial basis function neural networks
-
Bishop, C.: Improving the Generalization Properties of Radial Basis Function Neural Networks. Neural Computation 3(4), 579-588 (1991)
-
(1991)
Neural Computation
, vol.3
, Issue.4
, pp. 579-588
-
-
Bishop, C.1
-
4
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
Bleha, S., Slivinsky, C., Hussien, B.: Computer-access Security Systems Using Keystroke Dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence 12(12), 1217-1222 (1990)
-
(1990)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussien, B.3
-
5
-
-
26844493026
-
Telephones -a survey of attitudes and practices
-
Clarke, N.L., Furnell, S.M.: Telephones -A Survey of Attitudes and Practices. Computers & Security 24(7), 519-527 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.L.1
Furnell, S.M.2
-
6
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
DOI 10.1007/s10207-006-0006-6
-
Clarke, N.L., Furnell, S.M.: Authenticating Mobile Phone Users Using Keystroke Analysis. International Journal of Information Security 6(1), 1-14 (2007) (Pubitemid 44963965)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
9
-
-
84862067265
-
Touch Me Once and i Know It's You!: Implicit Authentication based on Touch Screen Patterns
-
ACM, New York
-
De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch Me Once and I Know It's You!: Implicit Authentication based on Touch Screen Patterns. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI), pp. 987-996. ACM, New York (2012)
-
(2012)
Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI)
, pp. 987-996
-
-
De Luca, A.1
Hang, A.2
Brudy, F.3
Lindner, C.4
Hussmann, H.5
-
11
-
-
0003578240
-
An empirical study of learning speed in back-propagation networks
-
Carnegie Mellon University, Pittsburgh, PA 15213
-
Fahlman, S.E.: An Empirical Study of Learning Speed in Back-propagation Networks. Technical Report CMU-CS-88-162, Carnegie Mellon University, Pittsburgh, PA 15213 (1988)
-
(1988)
Technical Report CMU-CS- 88-162
-
-
Fahlman, S.E.1
-
12
-
-
78649635621
-
Multi-touch user interface evaluation for 3d object manipulation on mobile devices
-
Fiorella, D., Sanna, A., Lamberti, F.: Multi-touch User Interface Evaluation for 3D Object Manipulation on Mobile Devices. Journal on Multimodal User Interfaces 4(1), 3-10 (2010)
-
(2010)
Journal on Multimodal User Interfaces
, vol.4
, Issue.1
, pp. 3-10
-
-
Fiorella, D.1
Sanna, A.2
Lamberti, F.3
-
13
-
-
85084161999
-
The design and analysis of graphical passwords
-
USENIX Association
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Proceedings of the 8th USENIX Security Symposium, pp. 1-15. USENIX Association (1999)
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 1-15
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
14
-
-
79956040654
-
On mouse dynamics as a behavioral biometric for authentication
-
New York, USA
-
Jorgensen, Z., Yu, T.: On Mouse Dynamics as a Behavioral Biometric for Authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), New York, USA, pp. 476-482 (2011)
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 476-482
-
-
Jorgensen, Z.1
Yu, T.2
-
15
-
-
36249004860
-
Keystroke analysis for thumb-based keyboards on mobile devices
-
Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.). Springer, Boston
-
Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 253-263. Springer, Boston (2007)
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments. IFIP
, vol.232
, pp. 253-263
-
-
Karatzouni, S.1
Clarke, N.2
-
16
-
-
84887058303
-
Can i Borrow Your Phone?: Understanding concernswhen Sharing Mobile Phones
-
ACM, New York
-
Karlson, A.K., Brush, A.B., Schechter, S.: Can I Borrow Your Phone?: Understanding ConcernsWhen Sharing Mobile Phones. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI), pp. 1647-1650. ACM, New York (2009)
-
(2009)
Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI)
, pp. 1647-1650
-
-
Karlson, A.K.1
Brush, A.B.2
Schechter, S.3
-
18
-
-
77954017165
-
Multi-touch authentication on tabletops
-
ACM, New York
-
Kim, D., Dunphy, P., Briggs, P., Hook, J., Nicholson, J.W., Nicholson, J., Olivier, P.: Multi-Touch Authentication on Tabletops. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI), pp. 1093-1102. ACM, New York (2010)
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI)
, pp. 1093-1102
-
-
Kim, D.1
Dunphy, P.2
Briggs, P.3
Hook, J.4
Nicholson, J.W.5
Nicholson, J.6
Olivier, P.7
-
19
-
-
79960002981
-
A personal identification system using retinal vasculature in retinal fundus images
-
Köse, C., ?Ikibaş, C.: A Personal Identification System using Retinal Vasculature in Retinal Fundus Images. Expert Systems with Applications 38(11), 13670-13681 (2011)
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.11
, pp. 13670-13681
-
-
Köse, C.1
Ikibaş, C.2
-
20
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic Identity Verification via Keystroke Characteristics. International Journal of Man-Machine Studies 35(6), 859-870 (1991)
-
(1991)
International Journal of Man-Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
22
-
-
35048874685
-
Training radial basis function networks with particle swarms
-
Yin, F.-L.,Wang, J., Guo, C. (eds.). Springer, Heidelberg, ISNN 2004
-
Liu, Y., Zheng, Q., Shi, Z., Chen, J.: Training Radial Basis Function Networks with Particle Swarms. In: Yin, F.-L.,Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3173, pp. 317-322. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3173
, pp. 317-322
-
-
Liu, Y.1
Zheng, Q.2
Shi, Z.3
Chen, J.4
-
23
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
DOI 10.1109/34.990140
-
Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Fvc2000: Fingerprint Verification Competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 402-412 (2002) (Pubitemid 35289355)
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
24
-
-
79959321460
-
Keystroke dynamics authentication for mobile phones
-
ACM, New York
-
Maiorana, E., Campisi, P., González-Carballo, N., Neri, A.: Keystroke Dynamics Authentication for Mobile Phones. In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), pp. 21-26. ACM, New York (2011)
-
(2011)
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC)
, pp. 21-26
-
-
Maiorana, E.1
Campisi, P.2
González-Carballo, N.3
Neri, A.4
-
25
-
-
3042781449
-
Toward reliable user authentication through biometrics
-
Matyás Jr., V., Riha, Z.: Toward Reliable User Authentication through Biometrics. IEEE Security and Privacy 1(3), 45-49 (2003)
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 45-49
-
-
Matyás Jr., V.1
Riha, Z.2
-
30
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security 1(2), 69-83 (2002)
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
32
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
DOI 10.1016/S0167-739X(99)00059-X
-
Monrose, F., Rubin, A.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems 16(4), 351-359 (2000) (Pubitemid 30552905)
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
33
-
-
77958105748
-
Improving mouse dynamics biometric performance using variance reduction via extractors with Separate Features
-
Nakkabi, Y., Traoré, I., Ahmed, A.A.E.: Improving Mouse Dynamics Biometric Performance using Variance Reduction via Extractors with Separate Features. IEEE Transactions on Systems, Man, and Cybernetics, Part A 40(6), 1345-1353 (2010)
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part A
, vol.40
, Issue.6
, pp. 1345-1353
-
-
Nakkabi, Y.1
Traoré, I.2
Ahmed, A.A.E.3
-
34
-
-
84879914389
-
Using trusted computing for privacy preserving keystrokebased authentication in Smartphones
-
Nauman, M., Ali, T., Rauf, A.: Using Trusted Computing for Privacy Preserving Keystrokebased Authentication in Smartphones. Telecommunication Systems, 1-13 (2011)
-
(2011)
Telecommunication Systems
, pp. 1-13
-
-
Nauman, M.1
Ali, T.2
Rauf, A.3
-
35
-
-
70350228922
-
Finger identification for touch panel operation using tapping fluctuation
-
May
-
Numabe, Y., Nonaka, H., Yoshikawa, T.: Finger Identification for Touch Panel Operation using Tapping Fluctuation. In: Proceedings of the IEEE 13th International Symposium on Consumer Electronics, pp. 899-902 (May 2009)
-
(2009)
Proceedings of the IEEE 13th International Symposium on Consumer Electronics
, pp. 899-902
-
-
Numabe, Y.1
Nonaka, H.2
Yoshikawa, T.3
-
37
-
-
0029341018
-
A detailed comparison of backpropagation neural network and maximum-likelihood classifiers for Urban Land Use Classification
-
Paola, J.D., Schowengerdt, R.A.: A Detailed Comparison of Backpropagation Neural Network and Maximum-likelihood Classifiers for Urban Land Use Classification. IEEE Transactions on Geoscience and Remote Sensing 33(4), 981-996 (1995)
-
(1995)
IEEE Transactions on Geoscience and Remote Sensing
, vol.33
, Issue.4
, pp. 981-996
-
-
Paola, J.D.1
Schowengerdt, R.A.2
-
39
-
-
69849091103
-
Hybrid learning enhancement of rbf network based on particle swarm optimization
-
Yu, W., He, H., Zhang, N. (eds.). Springer, Heidelberg
-
Qasem, S.N., Shamsuddin, S.M.: Hybrid Learning Enhancement of RBF Network based on Particle Swarm Optimization. In: Yu, W., He, H., Zhang, N. (eds.) ISNN 2009, Part III. LNCS, vol. 5553, pp. 19-29. Springer, Heidelberg (2009)
-
(2009)
ISNN 2009, Part III. LNCS
, vol.5553
, pp. 19-29
-
-
Qasem, S.N.1
Shamsuddin, S.M.2
-
41
-
-
0029678894
-
Improved use of continuous attributes in C4.5
-
Quinlan, J.R.: Improved Use of Continuous Attributes in C4.5. Journal of Artificial Intelligence Research 4(1), 77-90 (1996) (Pubitemid 126646149)
-
(1996)
Journal of Artificial Intelligence Research
, vol.4
, pp. 77-90
-
-
Quinlan, J.R.1
-
42
-
-
1942484786
-
Tackling the poor assumptions of naive bayes text classifiers
-
Rennie, J.D.M., Shih, L., Teevan, J., Karger, D.R.: Tackling the Poor Assumptions of Naive Bayes Text Classifiers. In: Proceedings of the 20th International Conference on Machine Learning, pp. 616-623 (2003)
-
(2003)
Proceedings of the 20th International Conference on Machine Learning
, pp. 616-623
-
-
Rennie, J.D.M.1
Shih, L.2
Teevan, J.3
Karger, D.R.4
-
44
-
-
0032021402
-
Computer user verification using login string keystroke dynamics
-
PII S1083442798015859
-
Robinson, J.A., Liang, V.W., Chambers, J.A.M., MacKenzie, C.L.: Computer User Verification using Login String Keystroke Dynamics. IEEE Transactions on Systems, Man, and Cybernetics, Part A 28(2), 236-241 (1998) (Pubitemid 128752056)
-
(1998)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
MacKenzie, C.L.4
-
45
-
-
33744738243
-
Performance analysis of iris-based identification system at the matching score level
-
DOI 10.1109/TIFS.2006.873603
-
Schmid, N.A., Ketkar, M.V., Singh, H., Cukic, B.: Performance Analysis of Iris-based Identification System at the Matching Score Level. IEEE Transactions on Information Forensics and Security 1(2), 154-168 (2006) (Pubitemid 43824627)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 154-168
-
-
Schmid, N.A.1
Ketkar, M.V.2
Singh, H.3
Cukic, B.4
-
46
-
-
77950675112
-
Google android: A comprehensive security assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security Privacy 8(2), 35-44 (2010)
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
47
-
-
34250782167
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
DOI 10.1145/1143120.1143128, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
-
Tari, F., Ozok, A.A., Holden, S.H.: A Comparison of Perceived and Real Shoulder-Surfing Risks between Alphanumeric and Graphical Passwords. In: Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS), pp. 56-66. ACM, New York (2006) (Pubitemid 46966969)
-
(2006)
ACM International Conference Proceeding Series
, vol.149
, pp. 56-66
-
-
Tari, F.1
Ozok, A.A.2
Holden, S.H.3
-
49
-
-
84858388270
-
Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian Mixture Models
-
Wallace, R.,McLaren,M.,McCool, C.,Marcel, S.: Cross-pollination of Normalisation Techniques from Speaker to Face Authentication using Gaussian Mixture Models. IEEE Transactions on Information Forensics and Security 7(2), 553-562 (2012)
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 553-562
-
-
Wallace, R.1
McLaren, M.2
McCool, C.3
Marcel, S.4
-
51
-
-
0033362601
-
Evolving artificial neural networks
-
DOI 10.1109/5.784219
-
Yao, X.: Evolving Artificial Neural Networks. Proceedings of the IEEE 87(9), 1423-1447 (1999) (Pubitemid 30503424)
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.9
, pp. 1423-1447
-
-
Yao, X.1
-
52
-
-
76649098286
-
Keystroke-based user identification on smart phones
-
Kirda, E., Jha, S., Balzarotti, D. (eds.). RAID 2009, Springer, Heidelberg
-
Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-Based User Identification on Smart Phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 224-243. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5758
, pp. 224-243
-
-
Zahid, S.1
Shahzad, M.2
Khayam, S.A.3
Farooq, M.4
-
53
-
-
80755187823
-
An efficient user verification system via mouse movements
-
ACM, New York
-
Zheng, N., Paloski, A., Wang, H.: An Efficient User Verification System via Mouse Movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 139-150. ACM, New York (2011)
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
|