Emphasizing typing signature in keystroke dynamics using immune algorithms
暂无分享,去创建一个
[1] Francisco Herrera,et al. A study on the use of non-parametric tests for analyzing the evolutionary algorithms’ behaviour: a case study on the CEC’2005 Special Session on Real Parameter Optimization , 2009, J. Heuristics.
[2] Roy A. Maxion,et al. Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.
[3] Sungzoon Cho,et al. Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.
[4] Zyad Shaaban,et al. Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix , 2006, 2006 International Conference on Dependability of Computer Systems.
[5] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[6] Christophe Rosenberger,et al. Can Chronological Information be Used as a Soft Biometric in Keystroke Dynamics? , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[7] Roy A. Maxion,et al. The Effect of Clock Resolution on Keystroke Dynamics , 2008, RAID.
[8] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Woojin Chang. Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples , 2006, ETRICS.
[10] Baptiste Hemery,et al. Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..
[11] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[12] Cheng-Jung Tsai,et al. A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..
[13] Janez Demsar,et al. Statistical Comparisons of Classifiers over Multiple Data Sets , 2006, J. Mach. Learn. Res..
[14] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[15] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[16] C. Bandt. Ordinal time series analysis , 2005 .
[17] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[18] Frank Klawonn,et al. Guide to Intelligent Data Analysis - How to Intelligently Make Sense of Real Data , 2010, Texts in Computer Science.
[19] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[20] Zhou Ji,et al. V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..
[21] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[22] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[23] Ana Carolina Lorena,et al. A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.
[24] Marc Ebner,et al. On The Use Of Negative Selection In An Artificial Immune System , 2002, GECCO.
[25] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[26] Ana Carolina Lorena,et al. Negative Selection with High-Dimensional Support for Keystroke Dynamics , 2012, 2012 Brazilian Symposium on Neural Networks.
[27] Kenneth Revett. User Authentication via Keystroke Dynamics: An Artificial Immune System Based Approach , 2011 .
[28] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[29] Christophe Rosenberger,et al. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[30] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[31] Ana Carolina Lorena,et al. Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach , 2012, Int. J. Nat. Comput. Res..
[32] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[33] Bojan Cukic,et al. Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[34] Claudia Eckert,et al. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.
[35] E.O. Freire,et al. Equalization of keystroke timing histograms for improved identification performance , 2006, 2006 International Telecommunications Symposium.
[36] Jugurta R. Montalvão Filho,et al. On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..
[37] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[38] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.