Network Traffic and Data

[1]  Charles Elkan,et al.  Results of the KDD'99 classifier learning , 2000, SKDD.

[2]  Matthias Schonlau,et al.  Detecting masquerades in intrusion detection based on unpopular commands , 2000, Inf. Process. Lett..

[3]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[4]  Urmila Kukreja,et al.  RUI: Recording user input from interfaces under Windows and Mac OS X , 2006, Behavior research methods.

[5]  Allen Newell,et al.  The keystroke-level model for user performance time with interactive systems , 1980, CACM.

[6]  John J. Leggett,et al.  Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..

[7]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[8]  John McHugh,et al.  Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.

[9]  Jaideep Srivastava,et al.  Automatic personalization based on Web usage mining , 2000, CACM.

[10]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[11]  Yun Wang,et al.  Determining the Minimum Sample Size of Audit Data Required to Profile User Behavior and Detect Anomaly Intrusion , 2006, Int. J. Bus. Data Commun. Netw..

[12]  Inyoung Kim,et al.  Profiling User Behavior for Intrusion Detection Using Item Response Modeling , 2007 .

[13]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[14]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[15]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[16]  A. Karr,et al.  Computer Intrusion: Detecting Masquerades , 2001 .

[17]  Michael J. Pazzani,et al.  Learning and Revising User Profiles: The Identification of Interesting Web Sites , 1997, Machine Learning.

[18]  M. Angela Sasse,et al.  Successful multiparty audio communication over the Internet , 1998, CACM.

[19]  David E. Kieras,et al.  The GOMS family of user interface analysis techniques: comparison and contrast , 1996, TCHI.

[20]  Sungzoon Cho,et al.  Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..