-
1
-
-
84887430954
-
Biometric authentication via keystroke sound, 2013
-
June
-
J. Roth, X. Liu, A. Ross, and D. Metaxas, "Biometric authentication via keystroke sound, "in 2013 Intl. Conf. on Biometrics, , June 2013, pp. 1-8.
-
(2013)
Intl. Conf. on Biometrics
, pp. 1-8
-
-
Roth, J.1
Liu, X.2
Ross, A.3
Metaxas, D.4
-
2
-
-
84896965392
-
Biometric recognition based on free-Text keystroke dynamics
-
April
-
A. Ahmed and I. Traore, "Biometric recognition based on free-Text keystroke dynamics, "IEEE Trans. on Cybernetics, vol. 44, no. 4, pp. 458-472, April 2014.
-
(2014)
IEEE Trans. on Cybernetics
, vol.44
, Issue.4
, pp. 458-472
-
-
Ahmed, A.1
Traore, I.2
-
3
-
-
84893807924
-
Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works in 2013
-
Sept
-
J. Monaco, J. Stewart, S.-H. Cha, and C. Tappert, "Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works, "in 2013 IEEE Sixth Intl. Conf. on Biometrics: Theory, Applications and Systems, Sept 2013, pp. 1-8.
-
(2013)
IEEE Sixth Intl. Conf. on Biometrics: Theory, Applications and Systems
, pp. 1-8
-
-
Monaco, J.1
Stewart, J.2
Cha, S.-H.3
Tappert, C.4
-
4
-
-
84856096161
-
An investigation of keystroke and stylometry traits for authenticating online test takers 2011
-
Oct
-
J. Stewart, J. Monaco, S.-H. Cha, and C. Tappert, "An investigation of keystroke and stylometry traits for authenticating online test takers, "in 2011 Intl. Joint Conf. on Biometrics, Oct 2011, pp. 1-7.
-
(2011)
Intl. Joint Conf. on Biometrics
, pp. 1-7
-
-
Stewart, J.1
Monaco, J.2
Cha, S.-H.3
Tappert, C.4
-
5
-
-
85001195530
-
Fluency in writing: Generating text in l1 and l2
-
N. A. Chenoweth and J. R. Hayes, "Fluency in writing: Generating text in l1 and l2, "Written Communication, vol. 18, no. 1, pp. 80-98, 2001.
-
(2001)
Written Communication
, vol.18
, Issue.1
, pp. 80-98
-
-
Chenoweth, N.A.1
Hayes, J.R.2
-
6
-
-
23944460334
-
The inner voice in writing
-
N. A. Chenoweth "The inner voice in writing, "Written Communication, vol. 20, no. 1, pp. 99-118, 2003.
-
(2003)
Written Communication
, vol.20
, Issue.1
, pp. 99-118
-
-
Chenoweth, N.A.1
-
7
-
-
84864050515
-
Keystroke analysis: Reflections on procedures and measures
-
V. M. Baaijen, D. Galbraith, and K. de Glopper, "Keystroke analysis: Reflections on procedures and measures, "Written Communication, vol. 29, no. 3, pp. 246-277, 2012.
-
(2012)
Written Communication
, vol.29
, Issue.3
, pp. 246-277
-
-
Baaijen, V.M.1
Galbraith, D.2
De Glopper, K.3
-
8
-
-
0000433960
-
When does irregular spelling or pronunciation influence word recognition?
-
M. S. Seidenberg, G. S. Waters, M. A. Barnes, and M. K. Tanenhaus, "When Does Irregular Spelling or Pronunciation Influence Word Recognition? "J. of Verbal Learning and Verbal Behaviour, vol. 23, pp. 283-404, 1984.
-
(1984)
J. of Verbal Learning and Verbal Behaviour
, vol.23
, pp. 283-404
-
-
Seidenberg, M.S.1
Waters, G.S.2
Barnes, M.A.3
Tanenhaus, M.K.4
-
9
-
-
0013313816
-
Revision profiles: Patterns and implications
-
M. Schwartz, "Revision profiles: Patterns and implications, "College English, vol. 45, no. 6, pp. pp. 549-558, 1983.
-
(1983)
College English
, vol.45
, Issue.6
, pp. 549-558
-
-
Schwartz, M.1
-
10
-
-
0036762146
-
A revision of bloom s taxonomy: An overview
-
D. R. Krathwohl, "A revision of bloom s taxonomy: An overview, "Theory Into Practice, vol. 41, pp. 212-218, 2002.
-
(2002)
Theory into Practice
, vol.41
, pp. 212-218
-
-
Krathwohl, D.R.1
-
12
-
-
0038343934
-
Information fusion in biometrics
-
A. Jain and A. Ross, "Information fusion in biometrics, "Pattern Recognition Letters, vol. 24, pp. 2115-2125, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 2115-2125
-
-
Jain, A.1
Ross, A.2
-
13
-
-
84883296986
-
Decision fusion for multimodal active authentication
-
Jul.
-
A. Fridman, A. Stolerman, S. Acharya, P. Brennan, P. Juola, R. Greenstadt, and M. Kam, "Decision fusion for multimodal active authentication, "ITPro, vol. 15, pp. 29-33, Jul. 2013.
-
(2013)
ITPro
, vol.15
, pp. 29-33
-
-
Fridman, A.1
Stolerman, A.2
Acharya, S.3
Brennan, P.4
Juola, P.5
Greenstadt, R.6
Kam, M.7
-
14
-
-
84868597542
-
Developing a keystroke biometric system for continual authentication of computer users
-
Aug
-
J. Monaco, N. Bakelman, S.-H. Cha, and C. Tappert, "Developing a keystroke biometric system for continual authentication of computer users, "in European Intelligence and Security Informatics Conference, Aug 2012, pp. 210-216.
-
(2012)
European Intelligence and Security Informatics Conference
, pp. 210-216
-
-
Monaco, J.1
Bakelman, N.2
Cha, S.-H.3
Tappert, C.4
-
15
-
-
84874586100
-
Snoop-forge-replay attacks on continuous verification with keystrokes
-
March
-
K. Rahman, K. Balagani, and V. Phoha, "Snoop-forge-replay attacks on continuous verification with keystrokes, "IEEE Trans. on Info. Forensics and Security, vol. 8, no. 3, pp. 528-541, March 2013.
-
(2013)
IEEE Trans. on Info. Forensics and Security
, vol.8
, Issue.3
, pp. 528-541
-
-
Rahman, K.1
Balagani, K.2
Phoha, V.3
|