메뉴 건너뛰기




Volumn 15, Issue 4, 2013, Pages 29-33

Decision fusion for multimodal active authentication

Author keywords

authentication; biometrics; fusion; information technology; security; stylometry

Indexed keywords

BIOMETRIC SENSORS; BROWSING BEHAVIOR; DECISION FUSION ARCHITECTURE; KEYSTROKE DYNAMICS; MOUSE MOVEMENTS; OFFICE ENVIRONMENTS; SECURITY; STYLOMETRY;

EID: 84883296986     PISSN: 15209202     EISSN: None     Source Type: Journal    
DOI: 10.1109/MITP.2013.53     Document Type: Article
Times cited : (19)

References (16)
  • 1
    • 34547965365 scopus 로고    scopus 로고
    • A new biometrie technology based on mouse dynamics
    • DOI 10.1109/TDSC.2007.70207
    • A. Ahmed and I. Traore, "A New Biometric TechnologyBased On Mouse Dynamics," IEEE Trans. Dependableand Secure Computing, vol. 4, no. 3, 2007, pp. 165-179. (Pubitemid 47274809)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.3 , pp. 165-179
    • Ahmed, A.A.E.1    Traore, I.2
  • 6
    • 78751634242 scopus 로고    scopus 로고
    • Biometric personal authentication using keystroke dynamics: A review
    • M. Karnan, M. Akila, and N. Krishnaraj, "BiometricPersonal Authentication Using Keystroke Dynamics:A Review," Applied Soft Computing, vol. 11, no. 2, 2011,pp. 1565-1573.
    • (2011) Applied Soft Computing , vol.11 , Issue.2 , pp. 1565-1573
    • Karnan, M.1    Akila, M.2    Krishnaraj, N.3
  • 7
    • 34547659355 scopus 로고    scopus 로고
    • Evaluating the reliability of credential hardening through keystroke dynamics
    • DOI 10.1109/ISSRE.2006.25, 4021977, Proceedings - 17th International Symposium on Software Reliability Engineering, ISSRE 2006
    • N. Bartlow and B. Cukic, "Evaluating the Reliabilityof Credential Hardening through Keystroke Dynamics,"Proc. Int'l Symp. Software Reliability Engineering,IEEE, 2006, pp. 117-126. (Pubitemid 47213948)
    • (2006) Proceedings - International Symposium on Software Reliability Engineering, ISSRE , pp. 117-126
    • Bartlow, N.1    Cukic, B.2
  • 11
    • 42049084142 scopus 로고    scopus 로고
    • Writeprints: A stylometricapproach to identity-level identification and similarity detection in cyberspace
    • A. Abbasi and H. Chen, "Writeprints: A StylometricApproach to Identity-Level Identification and Similarity Detection in Cyberspace," ACM Trans. InformationSystems, vol. 26, no. 2, 2008, pp. 7:1-7:29.
    • (2008) ACM Trans. Information Systems , vol.26 , Issue.2 , pp. 71-729
    • Abbasi, A.1    Chen, H.2
  • 12
    • 0003120218 scopus 로고    scopus 로고
    • Fast training of support vector machines using sequential minimal optimization
    • MIT Press
    • J. Platt, "Fast Training of Support Vector MachinesUsing Sequential Minimal Optimization," Advancesin Kernel Methods-Support Vector Learning, MIT Press,1998, pp. 185-208.
    • (1998) Advancesin Kernel Methods-Support Vector Learning , pp. 185-208
    • Platt, J.1
  • 13
    • 27344450109 scopus 로고    scopus 로고
    • Applying authorship analysis to extremist-group Web forum messages
    • A. Abbasi and H. Chen, "Identification and Comparison of Extremist-Group Web Forum MessagesUsing Authorship Analysis," IEEE Intelligent Systems, vol. 20, no. 5, 2005, pp. 67-75. (Pubitemid 41527272)
    • (2005) IEEE Intelligent Systems , vol.20 , Issue.5 , pp. 67-75
    • Abbasi, A.1    Chen, H.2
  • 14
    • 37349017275 scopus 로고    scopus 로고
    • Behavioral modeling: An overview
    • R. Yampolskiy, "Behavioral Modeling: AnOverview," American J. Applied Sciences, vol. 5, no. 5, 2008, pp. 496-503.
    • (2008) American J. Applied Sciences , vol.5 , Issue.5 , pp. 496-503
    • Yampolskiy, R.1
  • 16
    • 0026153134 scopus 로고
    • Hardware complexity of binary distributed detection systems with isolated local Bayesian detectors
    • DOI 10.1109/21.97477
    • M. Kam, W. Chang, and Q. Zhu, "HardwareComplexity of Binary Distributed DetectionSystems with Isolated Local BayesianDetectors," IEEE Trans. Systems Man and Cybernetics,vol. 21, no. 3, 1991, pp. 565-571. (Pubitemid 21703520)
    • (1991) IEEE Transactions on Systems, Man and Cybernetics , vol.21 , Issue.3 , pp. 565-571
    • Kam Moshe1    Chang Wei2    Zhu Qiang3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.