-
2
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Trans. Info. & System Security, 5(4): 367-397, 2002.
-
(2002)
ACM Trans. Info. & System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
4
-
-
10044297649
-
-
NY: Springer
-
R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior. Guide to biometrics. NY: Springer, 2004.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
7
-
-
71749104688
-
Keystroke dynamics with low constraints svm based passphrase enrollment
-
R.Giot, M. El-Abed, and C. Rosenberger. Keystroke dynamics with low constraints svm based passphrase enrollment. Proc. IEEE Int. Conf. Biometrics: Theory, Applications, and Systems (BTAS), 2009.
-
(2009)
Proc. IEEE Int. Conf. Biometrics: Theory, Applications, and Systems (BTAS)
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
11
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
J. Leggett, G. Williams, M. Usnick, and M. Longnecker. Dynamic identity verification via keystroke characteristics. Int. J. Man Machine Studies, 35(6): 859-870, 1991.
-
(1991)
Int. J. Man Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
14
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Montrose, M.K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. Int. J. Info. Security, 1(2): 69-83, 2002.
-
(2002)
Int. J. Info. Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Montrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
16
-
-
33744965791
-
-
Lecture Notes Comp.Sci. 3832
-
R. N. Rodrigues, G.F.G. Yared, C.R. Costa, J.B.T. Yabu-Uti, F. Violaro, and L.L. Ling. Biometric access control through numerical keyboards based on keystroke dynamics. Lecture Notes Comp.Sci., 3832: 640-646, 2006.
-
(2006)
Biometric Access Control through Numerical Keyboards Based on Keystroke Dynamics
, pp. 640-646
-
-
Rodrigues, R.N.1
Yared, G.F.G.2
Costa, C.R.3
Yabu-Uti, J.B.T.4
Violaro, F.5
Ling, L.L.6
-
17
-
-
79951599175
-
Continuous verification using keystroke dynamics
-
Washington, DC
-
T. Shimshon, R. Moskovitch, L. Rokach, and Y. Elo, vici. Continuous verification using keystroke dynamics. Proc. Int. Conf. Comp. Intel. and Security. IEEE Computer Soc., Washington, DC, 411-415, 2010.
-
(2010)
Proc. Int. Conf. Comp. Intel. and Security. IEEE Computer Soc.
, pp. 411-415
-
-
Shimshon, T.1
Moskovitch, R.2
Rokach, L.3
Elo, Y.4
Vici5
-
18
-
-
62549150881
-
A survey of modern authorship attribution methods
-
E. Stamatatos. A survey of modern authorship attribution methods. J. Am. Soc. Info. Science and Tech., 60(3): 538-556, 2009.
-
(2009)
J. Am. Soc. Info. Science and Tech.
, vol.60
, Issue.3
, pp. 538-556
-
-
Stamatatos, E.1
-
20
-
-
78650286294
-
A keystroke biometric system for long-text input
-
C. Tappert, S. Cha, M. Villani, and R.S. Zack. A keystroke biometric system for long-text input. Int. J. Info. Security and Privacy (IJISP), 4(1): 32-60, 2010.
-
(2010)
Int. J. Info. Security and Privacy (IJISP)
, vol.4
, Issue.1
, pp. 32-60
-
-
Tappert, C.1
Cha, S.2
Villani, M.3
Zack, R.S.4
-
21
-
-
84872013214
-
Detecting hoaxes, frauds, and deception in writing style online
-
Wash. DC
-
S. Afroz, M. Brennan, and R. Greenstadt. Detecting hoaxes, frauds, and deception in writing style online. Proc. 2012 IEEE Sym. Security and Privacy. IEEE Computer Soc., Wash. DC, 461-475, 2012.
-
(2012)
Proc. 2012 IEEE Sym. Security and Privacy. IEEE Computer Soc.
, pp. 461-475
-
-
Afroz, S.1
Brennan, M.2
Greenstadt, R.3
-
22
-
-
84945955782
-
Authorship attribution of e-mail comparing classifiers cver a new corpus for evaluation
-
B. Allison and L. Guthrie. Authorship attribution of e-mail comparing classifiers cver a new corpus for evaluation, Proc. LREC'08, 2008.
-
(2008)
Proc. LREC'08
-
-
Allison, B.1
Guthrie, L.2
-
23
-
-
84871373109
-
Conversationally-inspired stylometric features for authorship attribution in instant messaging
-
NY
-
M.Cristani, et al. Conversationally-inspired stylometric features for authorship attribution in instant messaging. Proc. 20th ACM Int. Conf. Multimedia. NY, 1121-1124, 2012.
-
(2012)
Proc. 20th ACM Int. Conf. Multimedia.
, pp. 1121-1124
-
-
Cristani, M.1
-
24
-
-
84948951400
-
Gender-preferential text mining of e-mail discourse
-
Las Vegas, NV, Dec
-
M. Corney, O. de Vel, A. Anderson, and G. Mohay. Gender-preferential text mining of e-mail discourse. Proc. 18th Annual Computer Security App. Conf., Las Vegas, NV, Dec 2002.
-
(2002)
Proc. 18th Annual Computer Security App. Conf.
-
-
Corney, M.1
De Vel, O.2
Anderson, A.3
Mohay, G.4
-
26
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
55, Dec
-
O. de Vel, A. Anderson, M. Corney, and G. Mohay. Mining e-mail content for author identification forensics. ACM SIGMOD Record, 30(4):55, Dec 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
28
-
-
84878196060
-
Syntactic stylometry for deception detection
-
Stroudsburg, PA
-
S. Feng, R. Banerjee, and Y. Choi. Syntactic stylometry for deception detection. Proc. 50th Annual Meeting Assoc. Comp. Linguistics: Short Papers, Assoc. Comp. Ling., Stroudsburg, PA, 2: 171-175, 2012.
-
(2012)
Proc. 50th Annual Meeting Assoc. Comp. Linguistics: Short Papers, Assoc. Comp. Ling.
, vol.2
, pp. 171-175
-
-
Feng, S.1
Banerjee, R.2
Choi, Y.3
-
29
-
-
85119093321
-
Linguistic correlates of style: Authorship classification with deep linguistic analysis features
-
Morristown, NJ
-
M. Gamon. Linguistic correlates of style: Authorship classification with deep linguistic analysis features. Proc. 20th Int. Conf. Comp. Ling. (COLING '04). Assoc. Comp. Ling., Morristown, NJ, 611-617, 2004.
-
(2004)
Proc. 20th Int. Conf. Comp. Ling. (COLING '04). Assoc. Comp. Ling.
, pp. 611-617
-
-
Gamon, M.1
-
31
-
-
35648941630
-
Bigrams of syntactic labels for authorship discrimination of short texts
-
G. Hirst and O. Feiguina. Bigrams of syntactic labels for authorship discrimination of short texts. Literary and Linguistic Computing, 22(4): 405-417, 2007.
-
(2007)
Literary and Linguistic Computing
, vol.22
, Issue.4
, pp. 405-417
-
-
Hirst, G.1
Feiguina, O.2
-
32
-
-
34248695296
-
Multivariate analysis and the study of style variation
-
D. Hoover. Multivariate analysis and the study of style variation. Literary and Linguistic Computing, 18(4): 341-60, 2003.
-
(2003)
Literary and Linguistic Computing
, vol.18
, Issue.4
, pp. 341-360
-
-
Hoover, D.1
-
33
-
-
84937336631
-
Statistical stylistics and authorship attribution: An empirical investigation
-
D. Hoover. Statistical stylistics and authorship attribution: An empirical investigation. Literary and Linguistic Computing, 16: 421-44, 2001.
-
(2001)
Literary and Linguistic Computing
, vol.16
, pp. 421-444
-
-
Hoover, D.1
-
34
-
-
48749129671
-
A novel approach of mining write-prints for authorship attribution in e-mail forensics
-
F. Iqbal, R. Hadjidj, B. Fung, and M. Debbabi. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digtal Investigation, 5: 42-51, 2008.
-
(2008)
Digtal Investigation
, vol.5
, pp. 42-51
-
-
Iqbal, F.1
Hadjidj, R.2
Fung, B.3
Debbabi, M.4
-
35
-
-
77954704077
-
-Mail authorship verification for forensic investigation
-
E, ACM, New York, NY
-
F. Iqbal, L. Khan, C. Benjamin, and M. Debbabi. E-mail authorship verification for forensic investigation. Proc. 2010 ACM Symposium Applied Computing (SAC '10). ACM, New York, NY, 1591-1598, 2010.
-
(2010)
Proc. 2010 ACM Symposium Applied Computing (SAC '10)
, pp. 1591-1598
-
-
Iqbal, F.1
Khan, L.2
Benjamin, C.3
Debbabi, M.4
-
36
-
-
33745868242
-
N-gram-based author profiles for authorship attribution
-
Nova Scotia
-
V. Keselj, F. Peng, N. Cerone, and C. Thomas. N-gram-based author profiles for authorship attribution. Proc. Conf. Pacific Assoc. Comp. Ling., PACLING'03, Nova Scotia, 255-264, 2003.
-
(2003)
Proc. Conf. Pacific Assoc. Comp. Ling., PACLING'03
, pp. 255-264
-
-
Keselj, V.1
Peng, F.2
Cerone, N.3
Thomas, C.4
-
40
-
-
33745213523
-
From fingerprint to writeprint
-
J. Li, R. Zheng, and H. Chen. From fingerprint to writeprint. Comm. ACM, 49(4): 76-82, 2006.
-
(2006)
Comm. ACM
, vol.49
, Issue.4
, pp. 76-82
-
-
Li, J.1
Zheng, R.2
Chen, H.3
-
41
-
-
80053392629
-
Authorship attribution and verification with many authors and limited data
-
NJ
-
K. Luyckx and W. Daelemans. Authorship attribution and verification with many authors and limited data. Proc. 22nd Int. Conf. Comp. Ling., COLING '08, Assoc. Comp. Ling., NJ, 1: 513-520, 2008.
-
(2008)
Proc. 22nd Int. Conf. Comp. Ling., COLING '08, Assoc. Comp. Ling.
, vol.1
, pp. 513-520
-
-
Luyckx, K.1
Daelemans, W.2
-
43
-
-
84893808290
-
Computational stylometic approach based on frequent word and frequent pair in text mining authorship attrib
-
T. Mustafa, N. Mustapha, M. Azmi, and N. Sulaiman. Computational stylometic approach based on frequent word and frequent pair in text mining authorship attrib. IJCSNS Int. J. Comp. Sci. Net. Sec., 9-3, 2009.
-
(2009)
IJCSNS Int. J. Comp. Sci. Net. Sec.
, pp. 3-9
-
-
Mustafa, T.1
Mustapha, N.2
Azmi, M.3
Sulaiman, N.4
-
44
-
-
84876100930
-
On the feasibility of internet-scale author identification
-
A. Narayanan, A. Paskov, H. Gong, N.Z. Bethencourt, J. Stefanov, E. Shin, E.C.R. Song, D. On the feasibility of internet-scale author identification. IEEE Symp. Security and. Privacy, 300-314, 2012.
-
(2012)
IEEE Symp. Security And. Privacy
, pp. 300-314
-
-
Narayanan, A.1
Paskov, A.2
Gong, H.3
Bethencourt, N.Z.4
Stefanov, J.5
Shin, E.6
Song, E.C.R.D.7
-
45
-
-
70449455987
-
Compression and stylometry for author identification
-
D. Pavelec, L.S. Oliveira, E. Justino, F.D. Nobre Neto, and L.V. Batista. Compression and stylometry for author identification. Int. Joint Conf. Neural Networks, 2445-2450, 2009.
-
(2009)
Int. Joint Conf. Neural Networks
, pp. 2445-2450
-
-
Pavelec, D.1
Oliveira, L.S.2
Justino, E.3
Neto, F.D.N.4
Batista, L.V.5
-
46
-
-
84866859983
-
Comparing statistical similarity measures for stylistic multivariate analysis
-
Borovets, Bulgaria
-
M. Popescu and L. Dinu. Comparing statistical similarity measures for stylistic multivariate analysis. Proc. RANLP 2009, Borovets, Bulgaria, 2009.
-
(2009)
Proc. RANLP 2009
-
-
Popescu, M.1
Dinu, L.2
-
47
-
-
84859994601
-
Authorship attribution using probabilistic context-free grammars
-
PA
-
S. Raghavan, A. Kovashka, and R. Mooney. Authorship attribution using probabilistic context-free grammars. Proc. ACL 2010 Conf. Short Papers, CLShort '10, Assoc. Comp. Ling., PA, 38-42, 2010.
-
(2010)
Proc. ACL 2010 Conf. Short Papers, CLShort '10, Assoc. Comp. Ling.
, pp. 38-42
-
-
Raghavan, S.1
Kovashka, A.2
Mooney, R.3
-
49
-
-
78751523553
-
Variable length character n-gram approach for online writeprint identification
-
Nanjing, Jiangsu
-
J. Sun, Z. Yang, P. Wang, and S. Liu. Variable length character n-gram approach for online writeprint identification. Int.Conf. Multimedia Info. Netw. Sec. (MINES), Nanjing, Jiangsu, 486-490, 2010.
-
(2010)
Int.Conf. Multimedia Info. Netw. Sec. (MINES)
, pp. 486-490
-
-
Sun, J.1
Yang, Z.2
Wang, P.3
Liu, S.4
-
50
-
-
79951667823
-
Feature selection for online writeprint identification using hybrid genetic algorithm
-
Hangzhou
-
J. Sun, Z. Yang, P. Wang, L. Liu, and S. Liu. Feature selection for online writeprint identification using hybrid genetic algorithm. Int. Symp. Comp. Intel. and Design (ISCID), Hangzhou, 76-79, 2010.
-
(2010)
Int. Symp. Comp. Intel. and Design (ISCID)
, pp. 76-79
-
-
Sun, J.1
Yang, Z.2
Wang, P.3
Liu, L.4
Liu, S.5
-
51
-
-
78751544198
-
Authorship identification for online text
-
IEEE Computer Society, Washington, DC
-
F. Tan and R. Tsai. Authorship identification for online text. Proc. 2010 Int. Conf. Cyberworlds (CW '10). IEEE Computer Society, Washington, DC, 155-162, 2010.
-
(2010)
Proc. 2010 Int. Conf. Cyberworlds (CW '10)
, pp. 155-162
-
-
Tan, F.1
Tsai, R.2
-
52
-
-
77952877494
-
A comparative study on authorship attribution classification tasks using both neural network and statistical methods
-
N. Tsimboukakis and G. Tambouratzis. A comparative study on authorship attribution classification tasks using both neural network and statistical methods. Neural Comp. Appl., 19(4): 573-582, 2009.
-
(2009)
Neural Comp. Appl.
, vol.19
, Issue.4
, pp. 573-582
-
-
Tsimboukakis, N.1
Tambouratzis, G.2
-
53
-
-
85149113847
-
Linguistic profiling for author recognition and verification
-
Ling, Stroudsburg, PA
-
H. Van Halteren. Linguistic profiling for author recognition and verification. Proc. 42nd Annual Meeting Assoc. Comp.Ling, Stroudsburg, PA, 199-206, 2004.
-
(2004)
Proc. 42nd Annual Meeting Assoc. Comp.
, pp. 199-206
-
-
Halteren, H.V.1
-
54
-
-
33644552803
-
A framework for authorship identification of online messages: Writing-style features and classification techniques
-
Feb
-
R. Zheng, J. Li, H. Chen, and Z. Huang. A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Info. Science and Tech., Feb 2006.
-
(2006)
J. Am. Soc. Info. Science and Tech.
-
-
Zheng, R.1
Li, J.2
Chen, H.3
Huang, Z.4
-
55
-
-
35048871882
-
Authorship analysis in cybercrime investigation
-
Hsinchun Chen et al. Eds. Springer Berlin Heidelberg
-
R. Zheng, Y. Qin, Z. Huang, and H. Chen. Authorship Analysis in Cybercrime Investigation. Intel. Security Informatics, Hsinchun Chen et al., Eds., Springer Berlin Heidelberg, 2665: 59-73, 2003.
-
(2003)
Intel. Security Informatics
, vol.2665
, pp. 59-73
-
-
Zheng, R.1
Qin, Y.2
Huang, Z.3
Chen, H.4
|