메뉴 건너뛰기




Volumn 16, Issue 2, 2013, Pages

Examining a large keystroke biometrics dataset for statistical-attack openings

Author keywords

Biometrics; Keystroke dynamics; Spoofing attacks

Indexed keywords

ALGORITHMIC APPROACH; ALGORITHMIC ATTACKS; AUTHENTICATION SYSTEMS; BIOMETRIC SYSTEMS; KEYSTROKE DYNAMICS; PERFORMANCE DEGRADATION; SPOOFING ATTACKS; VERIFICATION SYSTEMS;

EID: 84885006760     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2516960     Document Type: Article
Times cited : (54)

References (49)
  • 1
    • 84885931816 scopus 로고    scopus 로고
    • Aivils, S. 2005. Ubuntu manuals. http://manpages.ubuntu.com/manpages/ gutsy/man8/xsendkeycode.8.html.
    • (2005) Ubuntu Manuals
    • Aivils, S.1
  • 2
    • 79952697017 scopus 로고    scopus 로고
    • On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
    • Balagani, K. S., Phoha, V. V., Ray, A., and Phoha, S. 2011. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Patt. Recog. Lett.
    • (2011) Patt. Recog. Lett.
    • Balagani, K.S.1    Phoha, V.V.2    Ray, A.3    Phoha, S.4
  • 5
    • 84876806083 scopus 로고    scopus 로고
    • Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing
    • USENIX Association, Berkeley, CA
    • Ballard, L., Monrose, F., and Lopresti, D. 2006b. Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. In Proceedings of the 15th Conference on USENIX Security Symposium. Vol. 15, USENIX Association, Berkeley, CA.
    • (2006) Proceedings of the 15th Conference on USENIX Security Symposium , vol.15
    • Ballard, L.1    Monrose, F.2    Lopresti, D.3
  • 9
    • 0032090155 scopus 로고    scopus 로고
    • Generating representative web workloads for network and server performance evaluation
    • Barford, P. and Crovella, M. 1998. Generating representative web workloads for network and server performance evaluation. In Proceedings of the ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. ACM, New York, 151-160. (Pubitemid 128593231)
    • (1998) Performance Evaluation Review , vol.26 , Issue.1 , pp. 151-160
    • Barford, P.1    Crovella, M.2
  • 19
    • 70450014575 scopus 로고    scopus 로고
    • Comparing anomaly-detection algorithms for keystroke dynamics
    • Killourhy, K. S. and Maxion, R. A. 2009. Comparing anomaly-detection algorithms for keystroke dynamics. In Proceedings of the DSN. 125-134.
    • (2009) Proceedings of the DSN , pp. 125-134
    • Killourhy, K.S.1    Maxion, R.A.2
  • 20
    • 1542597362 scopus 로고    scopus 로고
    • Rapid model parameterization from traffic measurements
    • Lan, K.-C. and Heidemann, J. 2002. Rapid model parameterization from traffic measurements. ACM Trans. Model. Comput. Simul. 12, 3, 201-229.
    • (2002) ACM Trans. Model. Comput. Simul. , vol.12 , Issue.3 , pp. 201-229
    • Lan, K.-C.1    Heidemann, J.2
  • 22
    • 34247990255 scopus 로고
    • On the Kolmogorov-Smirnov test for normality with mean and variance unknown
    • Lilliefors, H. 1967. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. J. Amer. Statist. Assoc.
    • (1967) J. Amer. Statist. Assoc.
    • Lilliefors, H.1
  • 23
    • 22444434834 scopus 로고    scopus 로고
    • Optimal design of reliable network systems in presence of uncertainty
    • DOI 10.1109/TR.2005.847279
    • Marseguerra, M., Zio, E., Podofillini, L., and Coit, D. W. 2005. Optimal design of reliable network systems in presence of uncertainty. IEEE Trans. Reliabil. 54, 2, 243-253. (Pubitemid 41005024)
    • (2005) IEEE Transactions on Reliability , vol.54 , Issue.2 , pp. 243-253
    • Marseguerra, M.1    Zio, E.2    Podofillini, L.3    Coit, D.W.4
  • 24
    • 84941871856 scopus 로고
    • The kolmogorov-smirnov test for goodness of fit
    • Massey, F. J. 1951. The Kolmogorov-Smirnov test for goodness of fit. J. Amer. Statist. Assoc. 46, 253, 68-78.
    • (1951) J. Amer. Statist. Assoc. , vol.46 , Issue.253 , pp. 68-78
    • Massey, F.J.1
  • 25
    • 55449089734 scopus 로고    scopus 로고
    • Robustness to non-normality of various tests for the one-sample location problem
    • McDougall, M. K. and Rayner, G. D. 2004. Robustness to non-normality of various tests for the one-sample location problem. J. Appl. Math. Decision Sci. 8, 4, 235-246.
    • (2004) J. Appl. Math. Decision Sci. , vol.8 , Issue.4 , pp. 235-246
    • McDougall, M.K.1    Rayner, G.D.2
  • 26
    • 84914171917 scopus 로고    scopus 로고
    • I can be you: Questioning the use of keystroke dynamics as a biometric
    • Meng, T. C., Gupta, P., and Gao, D. 2013. I can be you: Questioning the use of keystroke dynamics as a biometric. In Proceedings of NDSS'13.
    • (2013) Proceedings of NDSS'13
    • Meng, T.C.1    Gupta, P.2    Gao, D.3
  • 29
    • 85052678926 scopus 로고    scopus 로고
    • Bootstrapping trust in a "trusted" platform
    • USENIX Association
    • Parno, B. 2008. Bootstrapping trust in a "trusted" platform. In Hot Sec. USENIX Association.
    • (2008) Hot Sec
    • Parno, B.1
  • 30
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • DOI 10.1109/MSP.2004.89
    • Peacock, A., Ke, X., and Wilkerson, M. 2004. Typing patterns: A key to user identification. IEEE Sec. Priv. 2, 40-47. (Pubitemid 40168625)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 31
    • 5344244656 scopus 로고    scopus 로고
    • R Development Core Team. R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0
    • R Development Core Team. 2008. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0.
    • (2008) R: A Language and Environment for Statistical Computing
  • 32
    • 84874586100 scopus 로고    scopus 로고
    • Snoop-forge-replay attacks on continuous verification with keystrokes
    • Rahman, K. A., Balagani, K. S., and Phoha, V. V. 2013. Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans. Inf. Foren. Sec. 8, 3, 528-541.
    • (2013) IEEE Trans. Inf. Foren. Sec. , vol.8 , Issue.3 , pp. 528-541
    • Rahman, K.A.1    Balagani, K.S.2    Phoha, V.V.3
  • 40
    • 84871972472 scopus 로고    scopus 로고
    • Robustness of Keystroke-Dynamics based biometrics against synthetic forgeries
    • Stefan, D., Shu, X., and Yao, D. D. 2011. Robustness of Keystroke-Dynamics based biometrics against synthetic forgeries. Comput. Secur.
    • (2011) Comput. Secur.
    • Stefan, D.1    Shu, X.2    Yao, D.D.3
  • 46
    • 0036893759 scopus 로고    scopus 로고
    • Statistics review 6: Nonparametric methods
    • DOI 10.1186/cc1820
    • Whitley, E. and Ball, J. 2002. Statistics review 6: Nonparametric methods. Critical Care 6, 6, 509-513. (Pubitemid 35414582)
    • (2002) Critical Care , vol.6 , Issue.6 , pp. 509-513
    • Whitley, E.1    Ball, J.2
  • 47
    • 0014254846 scopus 로고
    • Probability plotting methods for the analysis of data
    • Wilk, M. and Gnanadesikan, R. 1968. Probability plotting methods for the analysis of data. Biometrica Trust 55, 1, 1-17.
    • (1968) Biometrica Trust , vol.55 , Issue.1 , pp. 1-17
    • Wilk, M.1    Gnanadesikan, R.2
  • 49
    • 0141522840 scopus 로고    scopus 로고
    • Ga-svm wrapper approach for feature subset selection in keystroke dynamics identity verification
    • Yu, E. and Cho, S. 2003. Ga-svm wrapper approach for feature subset selection in keystroke dynamics identity verification. In Proceedings of the International Joint Conference on Neural Networks. Vol. 3, 2253-2257.
    • (2003) Proceedings of the International Joint Conference on Neural Networks , vol.3 , pp. 2253-2257
    • Yu, E.1    Cho, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.