Using Continuous Face Verification to Improve Desktop Security
暂无分享,去创建一个
Sandeep Kumar | Terence Sim | Sheng Zhang | Rajkumar Janakiraman | S. Zhang | T. Sim | Sandeep Kumar | R. Janakiraman
[1] Paul A. Viola,et al. Robust Real-time Object Detection , 2001 .
[2] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[3] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[4] Carl Staelin,et al. lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.
[5] Rahul Sukthankar,et al. Memory-based face recognition for visitor identification , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).
[6] David G. Stork,et al. Pattern classification, 2nd Edition , 2000 .
[7] David G. Stork,et al. Pattern Classification , 1973 .
[8] Charles P. Pfleeger,et al. Security in computing , 1988 .
[9] M. Turk,et al. Temporal Integration for Continuous Multimodal Biometrics , 2003 .
[10] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[11] Robert Love,et al. Linux Kernel Development , 2003 .
[12] Gregory R. Ganger,et al. Secure Continuous Biometric-Enhanced Authentication , 2000 .
[13] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[14] S. Mason. Purdue University , 2005 .