-
1
-
-
84885931816
-
-
Aivils, S. 2005. Ubuntu manuals. http://manpages.ubuntu.com/manpages/ gutsy/man8/xsendkeycode.8.html.
-
(2005)
Ubuntu Manuals
-
-
Aivils, S.1
-
2
-
-
79952697017
-
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
-
Balagani, K. S., Phoha, V. V., Ray, A., and Phoha, S. 2011. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Patt. Recog. Lett.
-
(2011)
Patt. Recog. Lett.
-
-
Balagani, K.S.1
Phoha, V.V.2
Ray, A.3
Phoha, S.4
-
5
-
-
84876806083
-
Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing
-
USENIX Association, Berkeley, CA
-
Ballard, L., Monrose, F., and Lopresti, D. 2006b. Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. In Proceedings of the 15th Conference on USENIX Security Symposium. Vol. 15, USENIX Association, Berkeley, CA.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.3
-
6
-
-
35148815257
-
Forgery quality and its implications for behavioral biometric security
-
Special Edition
-
Ballard, L., Lopresti, D., Member, S., and Monrose, F. 2007. Forgery quality and its implications for behavioral biometric security. IEEE Trans. Syst. Man Cybernet. (Special Edition).
-
(2007)
IEEE Trans. Syst. Man Cybernet
-
-
Ballard, L.1
Lopresti, D.2
Member, S.3
Monrose, F.4
-
7
-
-
70349297048
-
Towards practical biometric key generation with randomized biometric templates
-
ACM, New York
-
Ballard, L., Kamara, S., Monrose, F., and Reiter, M. K. 2008a. Towards practical biometric key generation with randomized biometric templates. In Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM, New York, 235-244.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 235-244
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
Reiter, M.K.4
-
9
-
-
0032090155
-
Generating representative web workloads for network and server performance evaluation
-
Barford, P. and Crovella, M. 1998. Generating representative web workloads for network and server performance evaluation. In Proceedings of the ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. ACM, New York, 151-160. (Pubitemid 128593231)
-
(1998)
Performance Evaluation Review
, vol.26
, Issue.1
, pp. 151-160
-
-
Barford, P.1
Crovella, M.2
-
10
-
-
78650165017
-
User authentication through keystroke dynamics
-
Bergadano, F., Gunetti, D., and Picardi, C. 2002. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5, 367-397.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
15
-
-
85076925998
-
Not-a-Bot (NAB): Improving service availability in the face of Botnet attacks
-
Gummadi, R., Balakrishnan, H., Maniatis, P., and Ratnasamy, S. 2009. Not-a-Bot (NAB): Improving service availability in the face of Botnet attacks. In Proceedings of NSDI'09.
-
(2009)
Proceedings of NSDI'09
-
-
Gummadi, R.1
Balakrishnan, H.2
Maniatis, P.3
Ratnasamy, S.4
-
17
-
-
85123650840
-
Detecting change in data streams
-
Kifer, D., Ben-David, S., and Gehrke, J. 2004. Detecting change in data streams. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB'04). Vol. 30, 180-191.
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases (VLDB'04)
, vol.30
, pp. 180-191
-
-
Kifer, D.1
Ben-David, S.2
Gehrke, J.3
-
19
-
-
70450014575
-
Comparing anomaly-detection algorithms for keystroke dynamics
-
Killourhy, K. S. and Maxion, R. A. 2009. Comparing anomaly-detection algorithms for keystroke dynamics. In Proceedings of the DSN. 125-134.
-
(2009)
Proceedings of the DSN
, pp. 125-134
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
20
-
-
1542597362
-
Rapid model parameterization from traffic measurements
-
Lan, K.-C. and Heidemann, J. 2002. Rapid model parameterization from traffic measurements. ACM Trans. Model. Comput. Simul. 12, 3, 201-229.
-
(2002)
ACM Trans. Model. Comput. Simul.
, vol.12
, Issue.3
, pp. 201-229
-
-
Lan, K.-C.1
Heidemann, J.2
-
22
-
-
34247990255
-
On the Kolmogorov-Smirnov test for normality with mean and variance unknown
-
Lilliefors, H. 1967. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. J. Amer. Statist. Assoc.
-
(1967)
J. Amer. Statist. Assoc.
-
-
Lilliefors, H.1
-
23
-
-
22444434834
-
Optimal design of reliable network systems in presence of uncertainty
-
DOI 10.1109/TR.2005.847279
-
Marseguerra, M., Zio, E., Podofillini, L., and Coit, D. W. 2005. Optimal design of reliable network systems in presence of uncertainty. IEEE Trans. Reliabil. 54, 2, 243-253. (Pubitemid 41005024)
-
(2005)
IEEE Transactions on Reliability
, vol.54
, Issue.2
, pp. 243-253
-
-
Marseguerra, M.1
Zio, E.2
Podofillini, L.3
Coit, D.W.4
-
24
-
-
84941871856
-
The kolmogorov-smirnov test for goodness of fit
-
Massey, F. J. 1951. The Kolmogorov-Smirnov test for goodness of fit. J. Amer. Statist. Assoc. 46, 253, 68-78.
-
(1951)
J. Amer. Statist. Assoc.
, vol.46
, Issue.253
, pp. 68-78
-
-
Massey, F.J.1
-
25
-
-
55449089734
-
Robustness to non-normality of various tests for the one-sample location problem
-
McDougall, M. K. and Rayner, G. D. 2004. Robustness to non-normality of various tests for the one-sample location problem. J. Appl. Math. Decision Sci. 8, 4, 235-246.
-
(2004)
J. Appl. Math. Decision Sci.
, vol.8
, Issue.4
, pp. 235-246
-
-
McDougall, M.K.1
Rayner, G.D.2
-
26
-
-
84914171917
-
I can be you: Questioning the use of keystroke dynamics as a biometric
-
Meng, T. C., Gupta, P., and Gao, D. 2013. I can be you: Questioning the use of keystroke dynamics as a biometric. In Proceedings of NDSS'13.
-
(2013)
Proceedings of NDSS'13
-
-
Meng, T.C.1
Gupta, P.2
Gao, D.3
-
27
-
-
85084163045
-
Toward speech-generated cryptographic keys on resource-constrained devices
-
USENIX Association, Berkeley, CA
-
Monrose, F., Reiter, M. K., Li, Q., Lopresti, D. P., and Shih, C. 2002. Toward speech-generated cryptographic keys on resource-constrained devices. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, 283-296.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 283-296
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Lopresti, D.P.4
Shih, C.5
-
29
-
-
85052678926
-
Bootstrapping trust in a "trusted" platform
-
USENIX Association
-
Parno, B. 2008. Bootstrapping trust in a "trusted" platform. In Hot Sec. USENIX Association.
-
(2008)
Hot Sec
-
-
Parno, B.1
-
30
-
-
12844274372
-
Typing patterns: A key to user identification
-
DOI 10.1109/MSP.2004.89
-
Peacock, A., Ke, X., and Wilkerson, M. 2004. Typing patterns: A key to user identification. IEEE Sec. Priv. 2, 40-47. (Pubitemid 40168625)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
31
-
-
5344244656
-
-
R Development Core Team. R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0
-
R Development Core Team. 2008. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0.
-
(2008)
R: A Language and Environment for Statistical Computing
-
-
-
32
-
-
84874586100
-
Snoop-forge-replay attacks on continuous verification with keystrokes
-
Rahman, K. A., Balagani, K. S., and Phoha, V. V. 2013. Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans. Inf. Foren. Sec. 8, 3, 528-541.
-
(2013)
IEEE Trans. Inf. Foren. Sec.
, vol.8
, Issue.3
, pp. 528-541
-
-
Rahman, K.A.1
Balagani, K.S.2
Phoha, V.V.3
-
36
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
DOI 10.1109/TSMCB.2005.846648
-
Sheng, Y., Phoha, V., and Rovnyak, S. 2005. A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Syst. Man, Cybernet. Part B: Cybernetics 35, 4, 826-833. (Pubitemid 41644063)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
40
-
-
84871972472
-
Robustness of Keystroke-Dynamics based biometrics against synthetic forgeries
-
Stefan, D., Shu, X., and Yao, D. D. 2011. Robustness of Keystroke-Dynamics based biometrics against synthetic forgeries. Comput. Secur.
-
(2011)
Comput. Secur.
-
-
Stefan, D.1
Shu, X.2
Yao, D.D.3
-
42
-
-
70350686780
-
Attacking the bitlocker boot process
-
Springer-Verlag, Berlin
-
T̈urpe, S., Poller, A., Steffan, J., Stotz, J.-P., and Trukenm̈uller, J. 2009. Attacking the bitlocker boot process. In Proceedings of the 2nd International Conference on Trusted Computing (Trust'09). Springer-Verlag, Berlin, 183-196.
-
(2009)
Proceedings of the 2nd International Conference on Trusted Computing (Trust'09)
, pp. 183-196
-
-
T̈urpe, S.1
Poller, A.2
Steffan, J.3
Stotz, J.-P.4
Trukenm̈uller, J.5
-
43
-
-
84871942674
-
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
-
Wang, Z., Serwadda, A., Balagani, K., and Phoha, V. 2012. Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks. In Proceedings of the 5th IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS).
-
(2012)
Proceedings of the 5th IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS)
-
-
Wang, Z.1
Serwadda, A.2
Balagani, K.3
Phoha, V.4
-
44
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
ACM, New York
-
Weir, M., Aggarwal, S., Collins, M., and Stern, H. 2010. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). ACM, New York, 162-175.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
46
-
-
0036893759
-
Statistics review 6: Nonparametric methods
-
DOI 10.1186/cc1820
-
Whitley, E. and Ball, J. 2002. Statistics review 6: Nonparametric methods. Critical Care 6, 6, 509-513. (Pubitemid 35414582)
-
(2002)
Critical Care
, vol.6
, Issue.6
, pp. 509-513
-
-
Whitley, E.1
Ball, J.2
-
47
-
-
0014254846
-
Probability plotting methods for the analysis of data
-
Wilk, M. and Gnanadesikan, R. 1968. Probability plotting methods for the analysis of data. Biometrica Trust 55, 1, 1-17.
-
(1968)
Biometrica Trust
, vol.55
, Issue.1
, pp. 1-17
-
-
Wilk, M.1
Gnanadesikan, R.2
-
49
-
-
0141522840
-
Ga-svm wrapper approach for feature subset selection in keystroke dynamics identity verification
-
Yu, E. and Cho, S. 2003. Ga-svm wrapper approach for feature subset selection in keystroke dynamics identity verification. In Proceedings of the International Joint Conference on Neural Networks. Vol. 3, 2253-2257.
-
(2003)
Proceedings of the International Joint Conference on Neural Networks
, vol.3
, pp. 2253-2257
-
-
Yu, E.1
Cho, S.2
|