Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users
暂无分享,去创建一个
[1] Kang Ryoung Park,et al. A new multi-unit iris authentication based on quality assessment and score level fusion for mobile phones , 2010, Machine Vision and Applications.
[2] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[3] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[4] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[5] Robert P. Minch,et al. Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[6] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[7] Iwao Sasase,et al. Anomaly Detection on Mobile Phone Based Operational Behavior , 2008 .
[8] Sahin Albayrak,et al. Detecting Symbian OS malware through static function call analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[9] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[10] Jean-Pierre Seifert,et al. pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.
[11] Tyler Highlander,et al. Utilization of keyboard dynamics for unique identification of human users , 2014, NAECON 2014 - IEEE National Aerospace and Electronics Conference.
[12] Shari Trewin,et al. Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.
[13] Tingting Mu,et al. Detection of breast cancer using v-SVM and RBF networks with self organized selection of centers , 2005 .
[14] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[15] Charlie Miller,et al. Injecting SMS messages into smart phones for security analysis , 2009 .
[16] Michal Choras,et al. Contactless palmprint and knuckle biometrics for mobile devices , 2011, Pattern Analysis and Applications.
[17] R. P. Anto Kumar,et al. User Authentication Based On Keystroke Dynamics , 2014 .