Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works
暂无分享,去创建一个
[1] Rong Zheng,et al. From fingerprint to writeprint , 2006, Commun. ACM.
[2] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[3] George Tambouratzis,et al. A comparative study on authorship attribution classification tasks using both neural network and statistical methods , 2010, Neural Computing and Applications.
[4] Rong Zheng,et al. A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006, J. Assoc. Inf. Sci. Technol..
[5] Olivier de Vel,et al. Mining E-mail Authorship , 2000 .
[6] David L. Hoover. Multivariate Analysis and the Study of Style Variation , 2003, Lit. Linguistic Comput..
[7] Efstathios Stamatatos,et al. A survey of modern authorship attribution methods , 2009, J. Assoc. Inf. Sci. Technol..
[8] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[9] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[10] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[11] Louise Guthrie,et al. Authorship Attribution of E-Mail: Comparing Classifiers over a New Corpus for Evaluation , 2008, LREC.
[12] Zongkai Yang,et al. Variable Length Character N-Gram Approach for Online Writeprint Identification , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[13] Flora S. Tsai,et al. Authorship Identification for Online Text , 2010, 2010 International Conference on Cyberworlds.
[14] Kazimierz Kowalski,et al. Continuous Biometric User Authentication in Online Examinations , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[15] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[16] Richard Dazeley,et al. Authorship Attribution for Twitter in 140 Characters or Less , 2010, 2010 Second Cybercrime and Trustworthy Computing Workshop.
[17] Michael Gamon,et al. Linguistic correlates of style: authorship classification with deep linguistic analysis features , 2004, COLING.
[18] Liviu P. Dinu,et al. Comparing Statistical Similarity Measures for Stylistic Multivariate Analysis , 2009, RANLP.
[19] Yejin Choi,et al. Syntactic Stylometry for Deception Detection , 2012, ACL.
[20] Luiz Eduardo Soares de Oliveira,et al. Compression and stylometry for author identification , 2009, 2009 International Joint Conference on Neural Networks.
[21] Sung-Hyuk Cha,et al. A Keystroke Biometric Systemfor Long-Text Input , 2010, Int. J. Inf. Secur. Priv..
[22] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[23] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[24] David Yarowsky,et al. Stylometric Analysis of Scientific Articles , 2012, NAACL.
[25] David L. Hoover,et al. Statistical Stylistics and Authorship Attribution: an Empirical Investigation , 2001, Lit. Linguistic Comput..
[26] Zongkai Yang,et al. Feature Selection for Online Writeprint Identification Using Hybrid Genetic Algorithm , 2010, 2010 International Symposium on Computational Intelligence and Design.
[27] Benjamin C. M. Fung,et al. e-mail authorship verification for forensic investigation , 2010, SAC '10.
[28] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[29] Kenneth Revett,et al. Behavioral Biometrics: A Remote Access Approach , 2008 .
[30] Moshe Koppel,et al. Exploiting Stylistic Idiosyncrasies for Authorship Attribution , 2003 .
[31] Fuchun Peng,et al. N-GRAM-BASED AUTHOR PROFILES FOR AUTHORSHIP ATTRIBUTION , 2003 .
[32] Dawn Xiaodong Song,et al. On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.
[33] Hans van Halteren,et al. Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.
[34] Rong Zheng,et al. Authorship Analysis in Cybercrime Investigation , 2003, ISI.
[35] Sung-Hyuk Cha,et al. An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[36] Sung-Hyuk Cha,et al. Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.
[37] Norwati Mustapha,et al. Computational Stylometic Approach Based on Frequent Word and Frequent Pair in the Text Mining Authorship Attribution , 2009 .
[38] Rachel Greenstadt,et al. Detecting Hoaxes, Frauds, and Deception in Writing Style Online , 2012, 2012 IEEE Symposium on Security and Privacy.
[39] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[40] Walter Daelemans,et al. Shallow Text Analysis and Machine Learning for Authorship Attribtion , 2005, CLIN.
[41] Krzysztof A. Cyran. Machine learning approach to authorship attribution of literary texts , 2007 .
[42] George M. Mohay,et al. Gender-preferential text mining of e-mail discourse , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[43] Graeme Hirst,et al. Bigrams of Syntactic Labels for Authorship Discrimination of Short Texts , 2007, Lit. Linguistic Comput..
[44] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[45] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[46] Adriana Kovashka,et al. Authorship Attribution Using Probabilistic Context-Free Grammars , 2010, ACL.
[47] Walter Daelemans,et al. Authorship Attribution and Verification with Many Authors and Limited Data , 2008, COLING.
[48] Vittorio Murino,et al. Conversationally-inspired stylometric features for authorship attribution in instant messaging , 2012, ACM Multimedia.
[49] Benjamin C. M. Fung,et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics , 2008, Digit. Investig..
[50] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[51] Sung-Hyuk Cha,et al. A Keystroke Biometric System for Long-Text Input , 2013 .
[52] Lior Rokach,et al. Continuous Verification Using Keystroke Dynamics , 2010, 2010 International Conference on Computational Intelligence and Security.
[53] Graeme Hirst,et al. Authorship Attribution for Small Texts: Literary and Forensic Experiments , 2007, PAN.
[54] Henrique Santos,et al. Keystroke Dynamics for Continuous Access Control Enforcement , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.