Using associative classification to authenticate mobile device users
暂无分享,去创建一个
[1] Daniel Hunyadi,et al. Performance comparison of apriori and FP-growth algorithms in generating association rules , 2011 .
[2] Tempestt J. Neal,et al. Surveying Biometric Authentication for Mobile Device Security , 2016 .
[3] Elham Tabassi,et al. Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Jiawei Han,et al. CPAR: Classification based on Predictive Association Rules , 2003, SDM.
[5] Fadi A. Thabtah,et al. A review of associative classification mining , 2007, The Knowledge Engineering Review.
[6] Kamal Ali,et al. Partial Classification Using Association Rules , 1997, KDD.
[7] Chris Bevan,et al. Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..
[8] Das Amrita,et al. Mining Association Rules between Sets of Items in Large Databases , 2013 .
[9] Andrew S Branscomb. Behaviorally Identifying Smartphone Users. , 2013 .
[10] Alessandro Neri,et al. Keystroke dynamics authentication for mobile phones , 2011, SAC.
[11] P.Susan Lalitha Grace,et al. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017 .
[12] Jugal K. Kalita,et al. Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.
[13] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[14] P. Bhattarakosol,et al. Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[15] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[16] Tempestt J. Neal,et al. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[17] Mudhafar M. Al-Jarrah,et al. Statistical median-based classifier model for keystroke dynamics on mobile devices , 2016, 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC).
[18] Stephen Marsh,et al. Anomaly Detection for Mobile Device Comfort , 2014, IFIPTM.
[19] Kamaljit Singh Bhatia,et al. Keystroke Dynamics for Mobile Phones: A Survey , 2016 .
[20] Simon Tjoa,et al. Touch to Authenticate — Continuous Biometric Authentication on Mobile Devices , 2015, 2015 1st International Conference on Software Security and Assurance (ICSSA).
[21] Juliane Krämer,et al. “My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[22] Yi-Chung Hu,et al. Mining fuzzy association rules for classification problems , 2002 .
[23] Bing Liu,et al. Classification Using Association Rules: Weaknesses and Enhancements , 2001 .
[24] Paul Dowland,et al. Behaviour Profiling on Mobile Devices , 2010, 2010 International Conference on Emerging Security Technologies.
[25] Alexander De Luca,et al. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.
[26] Christian Borgelt,et al. Simple Algorithms for Frequent Item Set Mining , 2010, Advances in Machine Learning II.
[27] Maria Papadaki,et al. Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.
[28] B. Larson. Meet the Overlapping Coefficient , 2014 .
[29] Steven Furnell,et al. Transparent authentication systems for mobile device security: A review , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[30] Issa Traoré,et al. Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).