Performance evaluation of anomaly-detection algorithms for mouse dynamics
暂无分享,去创建一个
Zhongmin Cai | Xiaohong Guan | Chao Shen | Roy A. Maxion | X. Guan | R. Maxion | Chao Shen | Zhongmin Cai
[1] Eiji Okamoto,et al. A User Identification System Using Signature Written with Mouse , 1998, ACISP.
[2] David J. Sheskin,et al. Handbook of Parametric and Nonparametric Statistical Procedures , 1997 .
[3] Sajjad Haider,et al. A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[4] Patrick Bours,et al. A Login System Using Mouse Dynamics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[5] Roy A. Maxion. Making Experiments Dependable , 2011, Dependable and Historic Computing.
[6] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[7] Ana L. N. Fred,et al. A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.
[8] Mohammad S. Obaidat,et al. Biometric Authentication Using Mouse Gesture Dynamics , 2013, IEEE Systems Journal.
[9] Issa Traoré,et al. Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors With Separate Features , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[10] John A. Swets,et al. Evaluation of diagnostic systems : methods from signal detection theory , 1982 .
[11] Yong Sheng,et al. A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[12] Cliff B. Jones,et al. Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of His 75th Birthday , 2011, Dependable and Historic Computing.
[13] S. T. Buckland,et al. An Introduction to the Bootstrap. , 1994 .
[14] Claudio Carpineto,et al. A Survey of Automatic Query Expansion in Information Retrieval , 2012, CSUR.
[15] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[16] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[17] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[18] D.A. Schulz,et al. Mouse Curve Biometrics , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[19] Hamid Jahankhani,et al. A Survey of User Authentication Based on Mouse Dynamics , 2008 .
[20] K. Ross,et al. Sample design for educational survey research , 1978 .
[21] David G. Stork,et al. Pattern Classification , 1973 .
[22] Harry Wechsler,et al. The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..
[23] Zhongmin Cai,et al. Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring , 2009, 2009 IEEE International Conference on Communications.
[24] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[25] Peter W. McOwan,et al. Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[26] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[27] Yigitcan Aksari,et al. Active authentication by mouse movements , 2009, 2009 24th International Symposium on Computer and Information Sciences.
[28] I. Traore,et al. Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[29] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[30] Carl Gutwin,et al. Domain-Specific Keyphrase Extraction , 1999, IJCAI.
[31] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[32] Ana L. N. Fred,et al. An Identity Authentication System Based On Human Computer Interaction Behaviour , 2003, PRIS.
[33] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[34] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[35] Y. Hochberg. A sharper Bonferroni procedure for multiple tests of significance , 1988 .
[36] Zhongmin Cai,et al. On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[37] A.K. Jain,et al. Webbiometrics: User Verification Via Web Interaction , 2007, 2007 Biometrics Symposium.
[38] Ting Yu,et al. On mouse dynamics as a behavioral biometric for authentication , 2011, ASIACCS '11.
[39] Carla E. Brodley,et al. User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.
[40] Robert Tibshirani,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.