Improving static audio keystroke analysis by score fusion of acoustic and timing data
暂无分享,去创建一个
Patrick Bours | Matús Pleva | Jozef Juhár | Stanislav Ondás | Matus Pleva | Patrick A. H. Bours | J. Juhár | S. Ondás
[1] Patrick Bours,et al. Static Audio Keystroke Dynamics , 2015, MCSS.
[2] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[3] Ming-Hour Yang,et al. A mobile authentication system resists to shoulder-surfing attacks , 2016, Multimedia Tools and Applications.
[4] Hiroshi Dozono,et al. Comparison of the Adaptive Authentication Systems for Behavior Biometrics using the Variations of Self Organizing Maps , 2008 .
[5] Steve Young,et al. The HTK book version 3.4 , 2006 .
[6] Lukás Burget,et al. Analysis of Speaker Recognition Systems in Realistic Scenarios of the SITW 2016 Challenge , 2016, INTERSPEECH.
[7] Soumik Mondal,et al. A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.
[8] Mireia Díez,et al. GTTS Systems for the SWS Task at MediaEval 2013 , 2013, MediaEval.
[9] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[10] Ahmed A. Abd El-Latif,et al. Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics , 2013, Multimedia Tools and Applications.
[11] Patrick Bours. Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..
[12] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[13] Hiroshi Dozono,et al. Adaptive authentication system for behavior biometrics using supervised pareto self organizing maps , 2008 .
[14] K. Rajasekhara Rao,et al. Inclination and Pressure Based Authentication for Touch Devices , 2014 .
[15] Arun Ross,et al. Biometric authentication via keystroke sound , 2013, 2013 International Conference on Biometrics (ICB).
[16] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[17] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2009 .
[18] Niko Brümmer,et al. The BOSARIS Toolkit: Theory, Algorithms and Code for Surviving the New DCF , 2013, ArXiv.
[19] Martin Lojka,et al. Comparison of Different Feature Types for Acoustic Event Detection System , 2013, MCSS.
[20] Arun Ross,et al. Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.
[21] Mohammad S. Obaidat,et al. Online risk-based authentication using behavioral biometrics , 2013, Multimedia Tools and Applications.
[22] Patrick Bours,et al. Content Reconstruction Using Keystroke Dynamics: Preliminary Results , 2014, 2014 Fifth International Conference on Emerging Security Technologies.
[23] Ting-Yi Chang,et al. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices , 2014, Secur. Commun. Networks.
[24] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.