Competition between SOM Clusters to Model User Authentication System in Computer Networks
暂无分享,去创建一个
[1] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[2] Esa Alhoniemi,et al. Clustering of the self-organizing map , 2000, IEEE Trans. Neural Networks Learn. Syst..
[3] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[4] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[5] Xavier Anguera Miró,et al. Text independent speaker identification on noisy environments by means of self organizing maps , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.
[6] Anil K. Jain,et al. Artificial Neural Networks: A Tutorial , 1996, Computer.
[7] Mohammad S. Obaidat,et al. A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[8] Hsinchun Chen,et al. Internet Categorization and Search: A Self-Organizing Approach , 1996, J. Vis. Commun. Image Represent..
[9] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[10] Teuvo Kohonen,et al. The self-organizing map , 1990 .
[11] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[12] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[13] Thomas J. Alexandre,et al. Biometrics on smart cards: An approach to keyboard behavioral signature , 1997, Future Gener. Comput. Syst..
[14] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[15] Simson L. Garfinkel,et al. Email-Based Identification and Authentication: An Alternative to PKI? , 2003, IEEE Secur. Priv..
[16] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[17] Stephen Grossberg,et al. ARTMAP: supervised real-time learning and classification of nonstationary data by a self-organizing neural network , 1991, [1991 Proceedings] IEEE Conference on Neural Networks for Ocean Engineering.
[18] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[19] Nick Bartlow,et al. Username and Password Verification through Keystroke Dynamics , 2005 .
[20] Thomas Villmann,et al. Topology preservation in self-organizing feature maps: exact definition and measurement , 1997, IEEE Trans. Neural Networks.
[21] Itshak Lapidot,et al. Unsupervised speaker recognition based on competition between self-organizing maps , 2002, IEEE Trans. Neural Networks.
[22] Mohammad S. Obaidat,et al. A verification methodology for computer systems users , 1995, SAC '95.
[23] Shashi Phoha,et al. Computer User Authentication using Hidden Markov Model through Keystroke Dynamics , 2006 .
[24] Yong Sheng,et al. A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[25] Jari Kangas,et al. On the Analysis of Pattern Sequences by Self-Organizing Maps , 2007 .
[26] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[27] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[28] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[29] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[30] Anil K. Jain,et al. Artificial neural networks for feature extraction and multivariate data projection , 1995, IEEE Trans. Neural Networks.
[31] Daw-Tung Lin. Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[32] Sungzoon Cho,et al. Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.
[33] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[34] Yue Pan,et al. Parameter Discrimination Analysis in Speaker Identification Using Self Organizing Map , 1997, AVBPA.
[35] Mohammad S. Obaidat,et al. Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..
[36] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .