Taxonomy of Behavioural Biometrics
暂无分享,去创建一个
[1] Peter John Graham,et al. The new wave , 1968 .
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Réjean Plamondon,et al. Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..
[4] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[5] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[6] Juergen Luettin,et al. Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.
[7] Mark E. Oxley,et al. Cohort selection and word grammar effects for speaker recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[8] Peter L. Williams,et al. Gray's Anatomy: The Anatomical Basis of Medicine and Surgery , 1996 .
[9] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[10] Sridha Sridharan,et al. Person authentication using lip information , 1997, TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162).
[11] Juergen Luettin,et al. Acoustic-labial speaker verification , 1997, Pattern Recognit. Lett..
[12] V. S. Nalwa. Automatic on-line signature verification , 1997 .
[13] Carla E. Brodley,et al. Detecting the Abnormal: Machine Learning in Computer Security , 1997 .
[14] R. Wilder,et al. Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..
[15] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[16] Roland Auckenthaler,et al. Lip signatures for automatic person recognition , 1999, 1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451).
[17] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[18] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[19] Efstathios Stamatatos,et al. Automatic Authorship Attribution , 1999, EACL.
[20] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[21] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[22] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[23] Seppo Puuronen,et al. Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events , 1999, Recent Advances in Intrusion Detection.
[24] Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report , 2000, Recent Advances in Intrusion Detection.
[25] Tomohiro Yamamura,et al. A Driver Behavior Recognition Method Based on a Driver Model Framework , 2000 .
[26] Ivan Koychev,et al. Adaptation to Drifting User's Interests , 2000 .
[27] Alex Pentland,et al. Graphical models for driver behavior recognition in a SmartCar , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).
[28] Tieniu Tan,et al. Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[29] David L. Dowe,et al. Inductive Inference of Chess Player Strategy , 2000, PRICAI.
[30] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[31] Jude W. Shavlik,et al. Learning users' interests by unobtrusively observing their normal behavior , 2000, IUI '00.
[32] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[33] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[34] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[35] Neil J. Henderson,et al. Polymer thick-film sensors: possibilities for smartcard biometrics , 2001 .
[36] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[37] Olga Papaemmanouil,et al. Dynamic Recommendations in Internet Retailing , 2001, ECIS.
[38] Daniel J. Ragsdale,et al. A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[39] Kuldip K. Paliwal,et al. Information fusion for robust speaker verification , 2001, INTERSPEECH.
[40] Ioannis Pitas,et al. Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[41] Danielle Liu,et al. Application profiling of IP traffic , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..
[42] Sushil Jajodia,et al. Enhancing Profiles for Anomaly Detection Using Time Granularities , 2002, J. Comput. Secur..
[43] Diane Lambert,et al. Detecting fraud in the real world , 2002 .
[44] Anil K. Jain,et al. On-line signature verification, , 2002, Pattern Recognit..
[45] Neil M. White,et al. Sensing pressure for authentication , 2002 .
[46] Salvatore J. Stolfo,et al. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.
[47] Larry S. Davis,et al. Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.
[48] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[49] Roy A. Maxion,et al. Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.
[50] Stephen G. MacDonell,et al. Software Forensics: Extending Authorship Analysis Techniques to Computer Programs , 2002 .
[51] Jan Ramon,et al. Opponent modeling by analysing play , 2002 .
[52] Ralf Steinmetz,et al. Biometric applications based on handwriting , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[53] Gregory R. Ganger,et al. On the Feasibility of Intrusion Detection Inside Workstation Disks , 2003 .
[54] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[55] S. Gosling,et al. PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES The Do Re Mi’s of Everyday Life: The Structure and Personality Correlates of Music Preferences , 2003 .
[56] Arslan Brömme,et al. Multifactor Biometric Sketch Authentication , 2003, BIOSIG.
[57] C. Manikopoulos,et al. Investigation of neural network classification of computer network attacks , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[58] Kenneth A. Kaufman,et al. An Application of Symbolic Learning to Intrusion Detection: Preliminary Results from the LUS Methodology , 2003 .
[59] Ana L. N. Fred,et al. An Identity Authentication System Based On Human Computer Interaction Behaviour , 2003, PRIS.
[60] Arslan Brömme,et al. Using an Active Shape Structural Model for Biometric Sketch Recognition , 2003, DAGM-Symposium.
[61] Christoph C. Michael. Finding the vocabulary of program behavior data for anomaly detection , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[62] A. Bromme. A classification of biometric signatures , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[63] Geoffrey H. Kuenning,et al. Detecting insider threats by monitoring system call activity , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[64] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[65] Craig A. N. Soules,et al. Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior , 2003, USENIX Security Symposium.
[66] Vern Paxson,et al. Enhancing byte-level network intrusion detection signatures with context , 2003, CCS '03.
[67] Hyeyoung Park,et al. A New Similarity Measure Based on Intraclass Statistics for Biometrie Systems , 2003 .
[68] Raymond N. J. Veldhuis,et al. Grip-Pattern Recognition for Smart Guns , 2003 .
[69] Wing Hong Lau,et al. Person authentication using ASM based lip shape and intensity information , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[70] J.D.S. da Silva,et al. A neural network application for attack detection in computer networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[71] Larry Rudolph,et al. Passdoodles; a Lightweight Authentication Method , 2004 .
[72] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[73] Alexey Tsymbal,et al. The problem of concept drift: definitions and related work , 2004 .
[74] Tracy L. Westeyn,et al. Recognizing song-based blink patterns: applications for restricted and universal access , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[75] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[76] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[77] Malcolm Crompton,et al. Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy? , 2004 .
[78] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, ICPR 2004.
[79] Zygmunt Ciota. Speaker verification for multimedia application , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[80] Rama Chellappa,et al. Identification of humans using gait , 2004, IEEE Transactions on Image Processing.
[81] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[82] Hans van Halteren,et al. Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.
[83] Hüseyin Abut,et al. Biometric identification using driving behavioral signals , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[84] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[85] Siwei Lyu,et al. A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.
[86] Karen Renaud. Quantifying the quality of web authentication mechanisms , 2004 .
[87] Pieter H. Hartel,et al. Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.
[88] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[89] Karen Renaud,et al. Quantifying the quality of web authentication mechanisms: a usability perspective , 2004 .
[90] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[91] Xiaofan Lin,et al. Phoneme-less hierarchical accent classification , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[92] Mark S. Nixon,et al. On gait as a biometric: Progress and prospects , 2004, 2004 12th European Signal Processing Conference.
[93] Anil K. Jain,et al. Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.
[94] Brian A. Jacob,et al. To Catch a Cheat. , 2004 .
[95] Gaurav Gupta,et al. Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol , 2004, Int. J. Digit. EVid..
[96] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[97] Abdulmotaleb El-Saddik,et al. Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns , 2005, MULTIMEDIA '05.
[98] Julie Thorpe,et al. Pass-thoughts: authenticating with our minds , 2005, NSPW '05.
[99] Paola Britos,et al. Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.
[100] Mohammad Banikazemi,et al. Storage-based intrusion detection for storage area networks (SANs) , 2005, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05).
[101] Dmitry V. Novikov. Neural networks to intrusion detection , 2005 .
[102] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[103] Klaus Mueller,et al. Dynamic Approach for Face Recognition Using Digital Image Skin Correlation , 2005, AVBPA.
[104] Giancarlo Ruffo,et al. Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.
[105] Sung-Hyuk Cha,et al. Long-Text Keystroke Biometric Applications over the Internet , 2005, MLMTA.
[106] Akinori Ito,et al. Smile and laughter recognition using speech processing and face recognition from conversation video , 2005, 2005 International Conference on Cyberworlds (CW'05).
[107] A. El Saddik,et al. Automatic Identification of Participants in Haptic Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.
[108] Issa Traoré,et al. Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.
[109] Zhen Liu,et al. Dynamic learning of automata from the call stack log for anomaly detection , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[110] Venu Govindaraju,et al. Use of behavioral biometrics in intrusion detection and online gaming , 2006, SPIE Defense + Commercial Sensing.
[111] A. Murat Tekalp,et al. Multimodal person recognition for human-vehicle interaction , 2006, IEEE Multimedia.
[112] R.V. Yampolskiy,et al. ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION , 2006, 2006 IEEE Long Island Systems, Applications and Technology Conference.
[113] Anil K. Jain,et al. Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[114] Tzi-cker Chiueh,et al. Accurate and Automated System Call Policy-Based Intrusion Prevention , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[115] Shahram Latifi,et al. A Survey of Unimodal Biometric Methods , 2006, Security and Management.
[116] Yoohwan Kim,et al. Baseline Profile Stability for Network Anomaly Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[117] Richard Youmaran,et al. Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[118] Leon Reznik,et al. Anomaly Detection Based Intrusion Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[119] Hsin-Min Wang,et al. Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[120] Mohammad Bagher Shamsollahi,et al. Person Identification by Using AR Model for EEG Signals , 2007 .
[121] A. Garg,et al. Profiling Users in GUI Based Systems for Masquerade Detection , 2006, 2006 IEEE Information Assurance Workshop.
[122] Dongsheng Wang,et al. Research on object-storage-based intrusion detection , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).
[123] Sung-Hyuk Cha,et al. Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study , 2006 .
[124] José del R. Millán,et al. Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[125] R.V. Yampolskiy. Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.
[126] Roman V. Yampolskiy. Human Computer Interaction Based Intrusion Detection , 2007, Fourth International Conference on Information Technology (ITNG'07).
[127] Venu Govindaraju,et al. Direct and Indirect Human Computer Interaction Based Biometrics , 2007, J. Comput..
[128] Roman V. Yampolskiy. Secure Network Authentication with PassText , 2007, Fourth International Conference on Information Technology (ITNG'07).
[129] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[130] Venu Govindaraju,et al. Similarity Measure Functions for Strategy-Based Biometrics , 2008 .
[131] Roman V. Yampolskiy. Behavioral Modeling: an Overview , 2008 .
[132] Kenneth Revett,et al. Behavioral Biometrics: A Remote Access Approach , 2008 .
[133] Rolf Ingold,et al. Combined Handwriting and Speech Modalities for User Authentication , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[134] Efstathios Stamatatos,et al. Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.
[135] Vinayak Ashok Bharadi. Biometric Authentication Systems , 2012 .