-
1
-
-
34547965365
-
A new biometrie technology based on mouse dynamics
-
DOI 10.1109/TDSC.2007.70207
-
A. Ahmed and I. Traore, "A New Biometric TechnologyBased On Mouse Dynamics," IEEE Trans. Dependableand Secure Computing, vol. 4, no. 3, 2007, pp. 165-179. (Pubitemid 47274809)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
2
-
-
78650165017
-
User authenticationthrough keystroke dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi, "UserAuthenticationthrough Keystroke Dynamics," ACMTrans. Information System Security, vol. 5, no. 4, 2002,pp. 367-397.
-
(2002)
ACMTrans. Information System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
3
-
-
33947499205
-
Continuous verification using multimodal biometrics
-
DOI 10.1109/TPAMI.2007.1010, Special issue on Biometrics: Progress and Directions
-
T. Sim et al., "Continuous Verification Using Multimodal Biometrics," IEEE Trans. Pattern Analysis andMachine Intelligence, vol. 29, no. 4, 2007, pp. 687-700. (Pubitemid 46464408)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 687-700
-
-
Sim, T.1
Zhang, S.2
Janakiraman, R.3
Kumar, S.4
-
4
-
-
0022604939
-
Optimal data fusion in multiple sensor detection systems
-
Z. Chair and P. Varshney, "Optimal Data Fusionin Multiple Sensor Detection Systems," IEEE Trans.Aerospace and Electronic Systems, vol. AES-22, no. 1,1986, pp. 98-101. (Pubitemid 16572493)
-
(1986)
IEEE Transactions on Aerospace and Electronic Systems
, vol.AES-22
, Issue.1
, pp. 98-101
-
-
Chair, Z.1
Varshney, P.K.2
-
5
-
-
0003503113
-
-
Information and Computer Science, Univ. of California, Irvine
-
K. Ali and M. Pazzani, On the Link between Error Correlationand Error Reduction in Decision Tree Ensembles,tech. report, Information and Computer Science,Univ. of California, Irvine, 1995.
-
(1995)
On the Link between Error Correlationand Error Reduction in Decision Tree Ensembles,tech. Report
-
-
Ali, K.1
Pazzani, M.2
-
6
-
-
78751634242
-
Biometric personal authentication using keystroke dynamics: A review
-
M. Karnan, M. Akila, and N. Krishnaraj, "BiometricPersonal Authentication Using Keystroke Dynamics:A Review," Applied Soft Computing, vol. 11, no. 2, 2011,pp. 1565-1573.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.2
, pp. 1565-1573
-
-
Karnan, M.1
Akila, M.2
Krishnaraj, N.3
-
7
-
-
34547659355
-
Evaluating the reliability of credential hardening through keystroke dynamics
-
DOI 10.1109/ISSRE.2006.25, 4021977, Proceedings - 17th International Symposium on Software Reliability Engineering, ISSRE 2006
-
N. Bartlow and B. Cukic, "Evaluating the Reliabilityof Credential Hardening through Keystroke Dynamics,"Proc. Int'l Symp. Software Reliability Engineering,IEEE, 2006, pp. 117-126. (Pubitemid 47213948)
-
(2006)
Proceedings - International Symposium on Software Reliability Engineering, ISSRE
, pp. 117-126
-
-
Bartlow, N.1
Cukic, B.2
-
8
-
-
70349912425
-
Keystroke dynamics authentication for collaborativesystems
-
IEEE
-
R. Giot, M. El-Abed, and C. Rosenberger, "KeystrokeDynamics Authentication for CollaborativeSystems," Proc. Int'l Symp. Collaborative Technologies andSystems, IEEE, 2009, pp. 172-179.
-
(2009)
Proc. Int'l Symp. Collaborative Technologies AndSystems
, pp. 172-179
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
9
-
-
80755187823
-
An efficient user verification system via mouse movements
-
ACM
-
N. Zheng, A. Paloski, and H. Wang, "An EfficientUser Verification System via Mouse Movements,"Proc. 18th ACM Conf. Computer and Communications Security(CCS 11), ACM, 2011, pp. 139-150.
-
(2011)
Proc. 18th ACM Conf. Computer and Communications Security(CCS 11)
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
-
10
-
-
62549150881
-
A survey of modern authorshipattribution methods
-
E. Stamatatos, "A Survey of Modern AuthorshipAttribution Methods," J. Amer. Society forInformationScience and Technology, vol. 60, no. 3, 2009,pp. 538-56.
-
(2009)
J. Amer. Society ForInformationScience and Technology
, vol.60
, Issue.3
, pp. 538-556
-
-
Stamatatos, E.1
-
11
-
-
42049084142
-
Writeprints: A stylometricapproach to identity-level identification and similarity detection in cyberspace
-
A. Abbasi and H. Chen, "Writeprints: A StylometricApproach to Identity-Level Identification and Similarity Detection in Cyberspace," ACM Trans. InformationSystems, vol. 26, no. 2, 2008, pp. 7:1-7:29.
-
(2008)
ACM Trans. Information Systems
, vol.26
, Issue.2
, pp. 71-729
-
-
Abbasi, A.1
Chen, H.2
-
12
-
-
0003120218
-
Fast training of support vector machines using sequential minimal optimization
-
MIT Press
-
J. Platt, "Fast Training of Support Vector MachinesUsing Sequential Minimal Optimization," Advancesin Kernel Methods-Support Vector Learning, MIT Press,1998, pp. 185-208.
-
(1998)
Advancesin Kernel Methods-Support Vector Learning
, pp. 185-208
-
-
Platt, J.1
-
13
-
-
27344450109
-
Applying authorship analysis to extremist-group Web forum messages
-
A. Abbasi and H. Chen, "Identification and Comparison of Extremist-Group Web Forum MessagesUsing Authorship Analysis," IEEE Intelligent Systems, vol. 20, no. 5, 2005, pp. 67-75. (Pubitemid 41527272)
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 67-75
-
-
Abbasi, A.1
Chen, H.2
-
14
-
-
37349017275
-
Behavioral modeling: An overview
-
R. Yampolskiy, "Behavioral Modeling: AnOverview," American J. Applied Sciences, vol. 5, no. 5, 2008, pp. 496-503.
-
(2008)
American J. Applied Sciences
, vol.5
, Issue.5
, pp. 496-503
-
-
Yampolskiy, R.1
-
16
-
-
0026153134
-
Hardware complexity of binary distributed detection systems with isolated local Bayesian detectors
-
DOI 10.1109/21.97477
-
M. Kam, W. Chang, and Q. Zhu, "HardwareComplexity of Binary Distributed DetectionSystems with Isolated Local BayesianDetectors," IEEE Trans. Systems Man and Cybernetics,vol. 21, no. 3, 1991, pp. 565-571. (Pubitemid 21703520)
-
(1991)
IEEE Transactions on Systems, Man and Cybernetics
, vol.21
, Issue.3
, pp. 565-571
-
-
Kam Moshe1
Chang Wei2
Zhu Qiang3
|