Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring
暂无分享,去创建一个
Zhongmin Cai | Xiaohong Guan | Chao Shen | Huilan Sha | Jingzi Du | X. Guan | Chao Shen | Zhongmin Cai | Huilan Sha | Jingzi Du
[1] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[2] Erkki Oja,et al. A class of neural networks for independent component analysis , 1997, IEEE Trans. Neural Networks.
[3] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[4] J. Tenenbaum,et al. A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.
[5] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[6] Ana L. N. Fred,et al. An Identity Authentication System Based On Human Computer Interaction Behaviour , 2003, PRIS.
[7] Peter W. McOwan,et al. Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Carla E. Brodley,et al. User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.
[9] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[10] Ana Fred,et al. A Behavioural Biometric System Based on Human Computer Interaction , 2004 .
[11] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[12] Issa Traoré,et al. Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.
[13] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[14] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.