-
2
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach", Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 175-187, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
3
-
-
0029716418
-
A sense of self for UNIX processes
-
May
-
Forrest, S., Hofmeyr, S., Somayaji, A., and T. Longstaff, "A Sense of Self for UNIX Processes", Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
4
-
-
0024984013
-
A network security monitor
-
May
-
L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A Network Security Monitor", Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 296-304, May 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
5
-
-
0002473030
-
Dids (distributed intrusion detection systsem): Motivation, architecture, and an early prototype
-
Oct.
-
S. Snapp, J. Brentano, G. Dias, T. Goan, L. Heberlein, C. Ho, K. Levitt, B. Mukherjee, S. Smaha, T. Grance, D. Teal, and D. Mansur, "DIDS (Distributed Intrusion Detection Systsem): Motivation, Architecture, and an early prototype", Proceedings of the 14th National Computer Security conference, pp. 167-176, Oct. 1991.
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.1
Brentano, J.2
Dias, G.3
Goan, T.4
Heberlein, L.5
Ho, C.6
Levitt, K.7
Mukherjee, B.8
Smaha, S.9
Grance, T.10
Teal, D.11
Mansur, D.12
-
8
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
Dec.
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication", Proceeedings of the IEEE, Vol. 91, No. 12, Dec. 2003.
-
(2003)
Proceeedings of the IEEE
, vol.91
, Issue.12
-
-
O'gorman, L.1
-
9
-
-
3042781449
-
Toward reliable user authentication through biometrics
-
May/June
-
Matyas, V. Jr., Riha, Z., "Toward Reliable User Authentication through Biometrics", IEEE Security & Privacy Magazine, May/June 2003, Vol. 1 No. 3, pp 45- 49.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.3
, pp. 45-49
-
-
Matyas Jr., V.1
Riha, Z.2
-
10
-
-
0343700185
-
Authentication by keystroke timing: Some preliminary results
-
Gaines, R., Lisowski, W., Press, S., Shapiro, N., 1980. Authentication by Keystroke Timing: Some Preliminary Results. Rand. Report R-256-NSF. Rand Corporation.
-
(1980)
Rand. Report R-256-NSF. Rand Corporation
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
11
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
Legget, J, Williams, G., 1988. Dynamic Identity Verification via Keystroke Characteristics. Int. J. Man- Mach. Stud. 35, 859-870.
-
(1988)
Int. J. Man- Mach. Stud.
, vol.35
, pp. 859-870
-
-
Legget, J.1
Williams, G.2
-
12
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
Bleha, S., Slivinsky, C., Hussein, B., 1990. Computer-access Security Systems using Keystroke Dynamics. IEEE Trans. Patt. Anal. Mach. Int. PAMI-12, 12, 1217-1222.
-
(1990)
IEEE Trans. Patt. Anal. Mach. Int. PAMI-12
, vol.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussein, B.3
-
13
-
-
33745469937
-
A new biometrics technology based on mouse dynamics
-
Victoria, Canada, September
-
A.A.E. Ahmed, I. Traore "A New Biometrics Technology based on Mouse Dynamics", Technical Report ECE-03-5, University of Victoria, Department of Electrical and Computer Engineering, Victoria, Canada, September 2003.
-
(2003)
Technical Report ECE-03-5, University of Victoria, Department of Electrical and Computer Engineering
-
-
Ahmed, A.A.E.1
Traore, I.2
-
14
-
-
33745463077
-
Security monitoring through human computer interaction devices
-
Victoria, Canada, March
-
A.A.E. Ahmed, I. Traore "Security Monitoring through Human Computer Interaction Devices", Technical Report, University of Victoria, Department of Electrical and Computer Engineering, Victoria, Canada, March 2004.
-
(2004)
Technical Report, University of Victoria, Department of Electrical and Computer Engineering
-
-
Ahmed, A.A.E.1
Traore, I.2
|