Behavioral Biometrics: Categorization and Review
暂无分享,去创建一个
Roman V. Yampolskiy | Abdallah A. Mohamed | Nawaf Ali | Darryl D'Souza | Roman V Yampolskiy | Nawaf Ali | Darryl D'Souza
[1] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[2] Venu Govindaraju,et al. Similarity Measure Functions for Strategy-Based Biometrics , 2008 .
[3] Tomohiro Yamamura,et al. A Driver Behavior Recognition Method Based on a Driver Model Framework , 2000 .
[4] David L. Dowe,et al. Inductive Inference of Chess Player Strategy , 2000, PRICAI.
[5] Larry S. Davis,et al. Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.
[6] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[7] Tracy L. Westeyn,et al. Recognizing song-based blink patterns: applications for restricted and universal access , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[8] Christoph C. Michael,et al. Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report , 2000, Recent Advances in Intrusion Detection.
[9] Réjean Plamondon,et al. Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..
[10] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[11] José del R. Millán,et al. Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[12] Venu Govindaraju,et al. ER2: an intuitive similarity measure for on-line signature verification , 2004, IWFHR.
[13] Alex Pentland,et al. Graphical models for driver behavior recognition in a SmartCar , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).
[14] Nalini K. Ratha,et al. Automated Biometrics , 2001, ICAPR.
[15] Abdulmotaleb El-Saddik,et al. Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.
[16] Anil K. Jain,et al. Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Ting-Peng Liang,et al. Discovering user interests from Web browsing behavior: an application to Internet news services , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[18] Koichi Shinoda,et al. A statistical approach for person verification using human behavioral patterns , 2013, EURASIP J. Image Video Process..
[19] Roland Auckenthaler,et al. Lip signatures for automatic person recognition , 1999, 1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451).
[20] Yiannis E. Papelis,et al. Mathematical Model to Assess the Relative Effectiveness of Rift Valley Fever Countermeasures , 2011, Int. J. Artif. Life Res..
[21] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[22] Wing Hong Lau,et al. Person authentication using ASM based lip shape and intensity information , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[23] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[24] Juergen Luettin,et al. Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.
[25] Venu Govindaraju,et al. Use of behavioral biometrics in intrusion detection and online gaming , 2006, SPIE Defense + Commercial Sensing.
[26] Rama Chellappa,et al. Identification of humans using gait , 2004, IEEE Transactions on Image Processing.
[27] Julie Thorpe,et al. Pass-thoughts: authenticating with our minds , 2005, NSPW '05.
[28] Abdulmotaleb El-Saddik,et al. Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns , 2005, MULTIMEDIA '05.
[29] Hongwei Mo,et al. Handbook of Research on Artificial Immune Systems and Natural Computing: Applying Complex Adaptive Technologies , 2008 .
[30] Klaus Mueller,et al. Dynamic Approach for Face Recognition Using Digital Image Skin Correlation , 2005, AVBPA.
[31] Xiaofan Lin,et al. Phoneme-less hierarchical accent classification , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[32] Gaurav Gupta,et al. Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol , 2004, Int. J. Digit. EVid..
[33] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Faouzi Alaya Cheikh,et al. Gait Recognition using Time-of-Flight Sensor , 2011, BIOSIG.
[35] Venu Govindaraju,et al. Accent classification in speech , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[36] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[37] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[38] Tieniu Tan,et al. Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[39] Marilde Terezinha Prado Santos,et al. WOntoVLab: A Virtual Laboratory Authorship Process Based on Workflow and Ontologies , 2010, 2010 10th IEEE International Conference on Advanced Learning Technologies.
[40] Ioannis Pitas,et al. Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[41] Issa Traoré,et al. Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.
[42] Philip C. Woodland,et al. Maximum likelihood linear regression for speaker adaptation of continuous density hidden Markov models , 1995, Comput. Speech Lang..
[43] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[44] Paola Britos,et al. Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.
[45] Daniel J. Ragsdale,et al. A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[46] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[47] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[48] Yoohwan Kim,et al. Baseline Profile Stability for Network Anomaly Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[49] Kenneth A. Kaufman,et al. An Application of Symbolic Learning to Intrusion Detection: Preliminary Results from the LUS Methodology , 2003 .
[50] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[51] Venu Govindaraju,et al. Direct and Indirect Human Computer Interaction Based Biometrics , 2007, J. Comput..
[52] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[53] Anil K. Jain,et al. Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.
[54] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[55] Rasmus Larsen,et al. Analysis of Gait Using a Treadmill and a Time-of-Flight Camera , 2009, Dyn3D.
[56] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[57] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, ICPR 2004.
[58] Venu Govindaraju,et al. Dissimilarity functions for behavior-based biometrics , 2007, SPIE Defense + Commercial Sensing.
[59] Anil K. Jain,et al. On-line signature verification, , 2002, Pattern Recognit..
[60] Sridha Sridharan,et al. Person authentication using lip information , 1997, TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162).
[61] Fernando José Von Zuben,et al. Ecosystems Computing: Introduction to Biogeographic Computation , 2011, Int. J. Nat. Comput. Res..
[62] Rolf Ingold,et al. Combined Handwriting and Speech Modalities for User Authentication , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[63] Mohammad Bagher Shamsollahi,et al. Person Identification by Using AR Model for EEG Signals , 2007 .
[64] Jan Ramon,et al. Opponent modeling by analysing play , 2002 .
[65] Stephanie Schuckers,et al. Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..
[66] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[67] Pieter H. Hartel,et al. Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.
[68] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[69] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[70] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[71] Raymond N. J. Veldhuis,et al. Grip-Pattern Recognition for Smart Guns , 2003 .
[72] Giancarlo Ruffo,et al. Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.
[73] Kimihiro Yamanaka,et al. Biometric verification using the motion of fingers: a combination of physical and behavioural biometrics , 2010, Int. J. Biom..
[74] Matthew Lichtenberger. An implementation of a multi-touch draw-a-secret password schema for windows-based computers , 2011 .
[75] Roy A. Maxion,et al. Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.
[76] V. S. Nalwa. Automatic on-line signature verification , 1997 .
[77] Hsin-Min Wang,et al. Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[78] Claude Castelluccia,et al. On the uniqueness of Web browsing history patterns , 2014, Ann. des Télécommunications.
[79] A. El Saddik,et al. Automatic Identification of Participants in Haptic Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.
[80] Roman V. Yampolskiy. Human Computer Interaction Based Intrusion Detection , 2007, Fourth International Conference on Information Technology (ITNG'07).
[81] Efstathios Stamatatos,et al. Automatic Authorship Attribution , 1999, EACL.
[82] Hyeyoung Park,et al. A New Similarity Measure Based on Intraclass Statistics for Biometrie Systems , 2003 .
[83] Roman V. Yampolskiy. Secure Network Authentication with PassText , 2007, Fourth International Conference on Information Technology (ITNG'07).
[84] Siwei Lyu,et al. A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.
[85] A. Bromme. A classification of biometric signatures , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[86] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[87] Hakan Erdogan,et al. Multi-modal Person Recognition for Vehicular Applications , 2005, Multiple Classifier Systems.
[88] Yong-Sheng Ding,et al. Immune Based Bio-Network Architecture and its Simulation Platform for Future Internet , 2009 .
[89] Alexey Tsymbal,et al. The problem of concept drift: definitions and related work , 2004 .
[90] Yongjian Fu,et al. A Framework for Personal Web Usage Mining , 2002, International Conference on Internet Computing.
[91] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[92] H. Saevanee,et al. User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.
[93] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[94] Kuldip K. Paliwal,et al. Information fusion for robust speaker verification , 2001, INTERSPEECH.
[95] Richard Youmaran,et al. Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[96] Roger Wattenhofer,et al. A personal touch: recognizing users based on touch screen behavior , 2012, PhoneSense '12.
[97] Kenneth Revett,et al. Behavioral Biometrics: A Remote Access Approach , 2008 .
[98] Carla E. Brodley,et al. User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.
[99] Sushil Jajodia,et al. Enhancing Profiles for Anomaly Detection Using Time Granularities , 2002, J. Comput. Secur..
[100] Peter L. Williams,et al. Gray's Anatomy: The Anatomical Basis of Medicine and Surgery , 1996 .
[101] A. Murat Tekalp,et al. Multimodal person recognition for human-vehicle interaction , 2006, IEEE Multimedia.
[102] Arslan Brömme,et al. Using an Active Shape Structural Model for Biometric Sketch Recognition , 2003, DAGM-Symposium.
[103] Malcolm Crompton,et al. Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy? , 2004 .
[104] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[105] S. Gosling,et al. PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES The Do Re Mi’s of Everyday Life: The Structure and Personality Correlates of Music Preferences , 2003 .
[106] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[107] Jude W. Shavlik,et al. Learning users' interests by unobtrusively observing their normal behavior , 2000, IUI '00.
[108] Seppo Puuronen,et al. Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events , 1999, Recent Advances in Intrusion Detection.
[109] Lei Yang,et al. OpenSesame: Unlocking smart phone through handshaking biometrics , 2013, 2013 Proceedings IEEE INFOCOM.
[110] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[111] Salvatore J. Stolfo,et al. A Behavior-Based Approach to Securing Email Systems , 2003, MMM-ACNS.
[112] Kimihiro Yamanaka,et al. A Biometric Identification Using the Motion of Fingers , 2009, 2009 International Conference on Biometrics and Kansei Engineering.
[113] Diane Lambert,et al. Detecting fraud in the real world , 2002 .
[114] Piotr Porwik,et al. BIOMETRIC RECOGNITION SYSTEM BASED ON THE MOTION OF THE HUMAN BODY GRAVITY CENTRE ANALYSIS , 2010 .
[115] S. K. Dahel,et al. Accuracy performance analysis of multimodal biometrics , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[116] Juergen Luettin,et al. Acoustic-labial speaker verification , 1997, Pattern Recognit. Lett..
[117] Christoph C. Michael. Finding the vocabulary of program behavior data for anomaly detection , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[118] Karen Renaud,et al. Quantifying the quality of web authentication mechanisms: a usability perspective , 2004 .
[119] J. Piecha,et al. The body balance measures for neurological disease estimation and classification , 2003 .
[120] Hans van Halteren,et al. Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.
[121] Hüseyin Abut,et al. Biometric identification using driving behavioral signals , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[122] R.V. Yampolskiy. Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.
[123] Roman V. Yampolskiy. Behavioral Modeling: an Overview , 2008 .
[124] Mark E. Oxley,et al. Cohort selection and word grammar effects for speaker recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.