Network Traffic and Data
暂无分享,去创建一个
[1] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[2] Matthias Schonlau,et al. Detecting masquerades in intrusion detection based on unpopular commands , 2000, Inf. Process. Lett..
[3] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[4] Urmila Kukreja,et al. RUI: Recording user input from interfaces under Windows and Mac OS X , 2006, Behavior research methods.
[5] Allen Newell,et al. The keystroke-level model for user performance time with interactive systems , 1980, CACM.
[6] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[7] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[8] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[9] Jaideep Srivastava,et al. Automatic personalization based on Web usage mining , 2000, CACM.
[10] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[11] Yun Wang,et al. Determining the Minimum Sample Size of Audit Data Required to Profile User Behavior and Detect Anomaly Intrusion , 2006, Int. J. Bus. Data Commun. Netw..
[12] Inyoung Kim,et al. Profiling User Behavior for Intrusion Detection Using Item Response Modeling , 2007 .
[13] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[14] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[15] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[16] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[17] Michael J. Pazzani,et al. Learning and Revising User Profiles: The Identification of Interesting Web Sites , 1997, Machine Learning.
[18] M. Angela Sasse,et al. Successful multiparty audio communication over the Internet , 1998, CACM.
[19] David E. Kieras,et al. The GOMS family of user interface analysis techniques: comparison and contrast , 1996, TCHI.
[20] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..