메뉴 건너뛰기




Volumn 13, Issue 3, 2014, Pages 229-244

Active authentication for mobile devices utilising behaviour profiling

Author keywords

Active authentication; Behaviour profiling; Biometrics

Indexed keywords

BIOMETRICS; FUNCTIONS; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 84901199405     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-013-0209-6     Document Type: Article
Times cited : (72)

References (32)
  • 2
    • 0036749185 scopus 로고    scopus 로고
    • Behavior-based intrusion detection in mobile phone systems
    • Boukerche, A., Nitare, M. S. M. A.: Behavior-based intrusion detection in mobile phone systems. J. Parallel Distrib. Comput. 62(9), 1476-1490 (2002).
    • (2002) J. Parallel Distrib. Comput. , vol.62 , Issue.9 , pp. 1476-1490
    • Boukerche, A.1    Nitare, M.S.M.A.2
  • 5
    • 33845701766 scopus 로고    scopus 로고
    • Authenticating mobile phone users using keystroke analysis
    • Clarke, N. L., Furnell, S. M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1-14 (2006).
    • (2006) Int. J. Inf. Secur. , vol.6 , Issue.1 , pp. 1-14
    • Clarke, N.L.1    Furnell, S.M.2
  • 6
    • 26844493026 scopus 로고    scopus 로고
    • Authentication of users on mobile telephones-a survey of attitudes and practices
    • Clarke, N. L., Furnell, S. M.: Authentication of users on mobile telephones-a survey of attitudes and practices. Comput. Secur. 24(7), 519-527 (2005).
    • (2005) Comput. Secur. , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.L.1    Furnell, S.M.2
  • 7
    • 34250355113 scopus 로고    scopus 로고
    • The application of signature recognition to transparent handwriting verification for mobile devices
    • Clarke, N. L., Mekala, A. R.: The application of signature recognition to transparent handwriting verification for mobile devices. Inf. Manag. Comput. Secur. 15(3), 214-225 (2007).
    • (2007) Inf. Manag. Comput. Secur. , vol.15 , Issue.3 , pp. 214-225
    • Clarke, N.L.1    Mekala, A.R.2
  • 9
    • 84901221026 scopus 로고    scopus 로고
    • Credant, Phone Data makes 4. 2 Million Brits Vulnerable to ID Theft, Credant Accessed: 14 June 2012
    • Credant, Phone Data makes 4. 2 Million Brits Vulnerable to ID Theft, Credant, http://www. credant. com/news-a-events/press-releases/337-phone-data-makes-42-million-brits-vulnerable-to-id-theft. html (2009), Accessed: 14 June 2012.
    • (2009)
  • 10
    • 84901221027 scopus 로고    scopus 로고
    • DARPA, Active Authentication, DARPA aspx (2011), Accessed: 17 April 2012
    • DARPA, Active Authentication, DARPA, http://www. darpa. mil/OurWork/I2O/Programs/ActiveAuthentication. aspx (2011), Accessed: 17 April 2012.
  • 13
    • 84901221020 scopus 로고    scopus 로고
    • FBI, Smishing and Vishing, The FBI Accessed: 11 April 2012
    • FBI, Smishing and Vishing, The FBI, http://www. fbi. gov/news/stories/2010/november/cyber112410/cyber112410 (2010), Accessed: 11 April 2012.
    • (2010)
  • 14
    • 84901221021 scopus 로고    scopus 로고
    • Flurry, Mobile Apps: Models, Money and Loyalty. Flurry Smartphone Industry Pulse Accessed: 01 August 2012
    • Flurry, Mobile Apps: Models, Money and Loyalty. Flurry Smartphone Industry Pulse, http://blog. urry. com/bid/26376/Mobile-Apps-Models-Money-and-Loyalty (2009), Accessed: 01 August 2012.
    • (2009)
  • 17
    • 84901221010 scopus 로고    scopus 로고
    • ITU, Key Global Telecom Indicators for the World Telecommunication Service Sector, International Telecommunication Union Accessed 01 April 2012
    • ITU, Key Global Telecom Indicators for the World Telecommunication Service Sector, International Telecommunication Union, http://www. itu. int/ITUD/ict/statistics/atglance/KeyTelecom. html (2011), Accessed 01 April 2012.
    • (2011)
  • 18
    • 0033640646 scopus 로고    scopus 로고
    • Statistical pattern recognition: a review
    • doi:10.1109/34.824819
    • Jain, A. K., Duin, R. P. W., Mao, J.: Statistical pattern recognition: a review. Pattern Anal. Mach. Intell. IEEE Trans. 22(1), 4-37 (2000). doi: 10. 1109/34. 824819.
    • (2000) Pattern Anal. Mach. Intell. IEEE Trans. , vol.22 , Issue.1 , pp. 4-37
    • Jain, A.K.1    Duin, R.P.W.2    Mao, J.3
  • 19
    • 0030104449 scopus 로고    scopus 로고
    • Artificial neural networks: a tutorial
    • doi:10.1109/2.485891
    • Jain, A. K., Mao, J., Mohiuddin, K. M.: Artificial neural networks: a tutorial. Computer 29(3), 31-44 (1996). doi: 10. 1109/2. 485891.
    • (1996) Computer , vol.29 , Issue.3 , pp. 31-44
    • Jain, A.K.1    Mao, J.2    Mohiuddin, K.M.3
  • 20
    • 84901221011 scopus 로고    scopus 로고
    • Kaspersky Lab, European Users Mobile Behaviour and Awareness of Mobile Threats, Kaspersky Lab ZAO (2011), Accessed: 25 May 2012
    • Kaspersky Lab, European Users Mobile Behaviour and Awareness of Mobile Threats, Kaspersky Lab ZAO, http://www. kaspersky. com/news?id=207576289 (2011), Accessed: 25 May 2012.
  • 23
    • 84869596497 scopus 로고    scopus 로고
    • Profound Challenges, McAfee Accessed: 1 May 2012
    • Power, R.: Mobility and Security: Dazzling Opportunities, Profound Challenges, McAfee, http://www. mcafee. com/us/resources/reports/rp-cylab-mobilesecurity. pdf (2011), Accessed: 1 May 2012.
    • (2011) Mobility and Security: Dazzling Opportunities
    • Power, R.1
  • 24
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: an intrusion detection architecture for mobile networks
    • Samfat, D., Molva, R.: IDAMN: an intrusion detection architecture for mobile networks. IEEE J. Sel. Areas Commun. 15(7), 1373-1380 (1997).
    • (1997) IEEE J. Sel. Areas Commun. , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 25
    • 84901221012 scopus 로고    scopus 로고
    • Samsung, Galaxy Nexus, Samsung Accessed: 04 May 2012
    • Samsung., Galaxy Nexus, Samsung, http://www. samsung. com/uk/consumer/mobile-devices/smartphones/android/GT-I9250TSAXEU (2012), Accessed: 04 May 2012.
    • (2012)
  • 26
    • 84901221013 scopus 로고    scopus 로고
    • Securelist, Mobile Malware Evolution: An Overview, Part 3, Securelist (2009), Accessed: 30 March 2012
    • Securelist, Mobile Malware Evolution: An Overview, Part 3, Securelist, http://www. securelist. com/en/analysis?pubid=204792080 (2009), Accessed: 30 March 2012.
  • 27
    • 77953137615 scopus 로고    scopus 로고
    • Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
    • Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8), 1524-1537 (2010).
    • (2010) J. Syst. Softw. , vol.83 , Issue.8 , pp. 1524-1537
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 30
    • 84901221014 scopus 로고    scopus 로고
    • Which?, 13. 5 million UK mobile phone users at risk of fraud, Which? Tech Daily Accessed: 31 July 2012
    • Which?, 13. 5 million UK mobile phone users at risk of fraud, Which? Tech Daily, http://blogs. which. co. uk/mobile/mobile-phones/13-5-million-uk-mobile-phone-users-at-risk-of-fraud/ (2011), Accessed: 31 July 2012.
    • (2011)
  • 32
    • 42749101361 scopus 로고    scopus 로고
    • The MIT mobile device speaker verification corpus: data collection and preliminary experiments
    • Woo, R., Park, A., Hazen. T.: The MIT mobile device speaker verification corpus: data collection and preliminary experiments. In: Speaker and Language Recognition Workshop, pp. 1-6 (2006).
    • (2006) Speaker and Language Recognition Workshop , pp. 1-6
    • Woo, R.1    Park, A.2    Hazen, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.