Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics
暂无分享,去创建一个
Mauro Conti | Luciano Gamberini | Giuseppe Sartori | Merylin Monaro | Riccardo Spolaor | QianQian Li | L. Gamberini | G. Sartori | M. Conti | M. Monaro | Riccardo Spolaor | QianQian Li
[1] Mauro Conti,et al. On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks , 2016, CODASPY.
[2] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[3] J. de Houwer,et al. Implicit measures: A normative analysis and review. , 2009, Psychological bulletin.
[4] Regan L. Mandryk,et al. Identifying emotional states using keystroke dynamics , 2011, CHI.
[5] Luciano Gamberini,et al. Identity Verification Using a Kinematic Memory Detection Technique , 2017 .
[6] Bruno Verschuere,et al. Memory detection: theory and application of the concealed information test , 2011 .
[7] Claire Cardie,et al. Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.
[8] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[9] Umberto Castiello,et al. How to Accurately Detect Autobiographical Events , 2008, Psychological science.
[10] Luciano Gamberini,et al. The detection of faked identity using unexpected questions and mouse dynamics , 2017, PloS one.
[11] Hassan Takabi,et al. Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.
[12] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[13] Y. Anzai,et al. Pattern Recognition & Machine Learning , 2016 .
[14] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[15] Mauro Conti,et al. FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[16] Mauro Conti,et al. Biometric Authentication Methods on Smartphones: A Survey , 2016, PsychNology J..
[17] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[18] Yejin Choi,et al. Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays , 2014, EMNLP.
[19] Jay F. Nunamaker,et al. Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues , 2013, TMIS.
[20] P. Chandler,et al. Cognitive Load Theory and the Format of Instruction , 1991 .
[21] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[22] Giuseppe Sartori,et al. Detecting deception through kinematic analysis of hand movement , 2016 .
[23] Carlo Strapparava,et al. The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language , 2009, ACL.
[24] L. Zhou. An empirical investigation of deception behavior in instant messaging , 2005, IEEE Transactions on Professional Communication.
[25] Sebastian Möller,et al. Identity theft, computers and behavioral biometrics , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.
[26] D. Schacter,et al. Implicit memory: a selective review. , 1993, Annual review of neuroscience.
[27] Andrew Sears,et al. Automated stress detection using keystroke and linguistic features: An exploratory study , 2009, Int. J. Hum. Comput. Stud..
[28] Jeffrey J. Walczyk,et al. Advancing Lie Detection by Inducing Cognitive Load on Liars: A Review of Relevant Theories and Techniques Guided by Lessons from Polygraph-Based Approaches , 2013, Front. Psychology.
[29] Luciano Gamberini,et al. How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity , 2016, Symbiotic.
[30] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[31] Khalid Saeed,et al. A Keystroke Dynamics Based System for User Identification , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[32] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.