Mobile phones & behavioral modalities: Surveying users' practices
暂无分享,去创建一个
[1] Iosif Androulidakis,et al. Surveying users' practices regarding mobile phones' security features , 2009 .
[2] Steven Furnell,et al. Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .
[3] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[4] Gokhan Memik,et al. Into the wild: Studying real user activity patterns to guide power optimizations for mobile architectures , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[5] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[6] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[7] Eunjin Kim,et al. A Novel Biometric Identification Based on a User’s Input Pattern Analysis for Intelligent Mobile Devices , 2012 .
[8] Xiang-Yang Li,et al. Continuous user identification via touch and movement behavioral biometrics , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[9] Steven Furnell,et al. Multi-modal Behavioural Biometric Authentication for Mobile Devices , 2012, SEC.
[10] D. Dillman. Mail and internet surveys: The tailored design method, 2nd ed. , 2007 .
[11] Elena Zaitseva,et al. Smart phone users: Are they green users? , 2014, The 10th International Conference on Digital Technologies 2014.
[12] G. Padmavathi,et al. Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism , 2012 .
[13] Sheikh Iqbal Ahamed,et al. ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.