Who Are You? A Statistical Approach to Measuring User Authenticity
暂无分享,去创建一个
Sakshi Jain | Markus Dürmuth | Giorgio Giacinto | David Mandell Freeman | Battista Biggio | B. Biggio | G. Giacinto | Markus Dürmuth | Sakshi Jain | D. Freeman
[1] Claude Castelluccia,et al. Adaptive Password-Strength Meters from Markov Models , 2012, NDSS.
[2] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[3] Stuart E. Schechter,et al. Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks , 2010, HotSec.
[4] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[5] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[6] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[7] Ninghui Li,et al. A Study of Probabilistic Password Models , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Claude Castelluccia,et al. OMEN: Faster Password Guessing Using an Ordered Markov Enumerator , 2015, ESSoS.
[9] Amir Globerson,et al. Nightmare at test time: robust learning by feature deletion , 2006, ICML.
[10] Paul C. van Oorschot,et al. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts , 2014, USENIX Security Symposium.
[11] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[12] F ChenStanley,et al. An Empirical Study of Smoothing Techniques for Language Modeling , 1996, ACL.
[13] Blaine Nelson,et al. Exploiting Machine Learning to Subvert Your Spam Filter , 2008, LEET.
[14] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[15] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[16] Lorrie Faith Cranor,et al. Telepathwords: Preventing Weak Passwords by Reading Users' Minds , 2014, USENIX Security Symposium.
[17] Gang Wang,et al. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.
[18] Konstantin Beznosov,et al. Does my password go up to eleven?: the impact of password meters on password selection , 2013, CHI.
[19] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[20] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[21] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[22] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[23] Claudia Eckert,et al. Is Feature Selection Secure against Training Data Poisoning? , 2015, ICML.
[24] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[25] Cormac Herley,et al. Is Everything We Know about Password Stealing Wrong? , 2012, IEEE Security & Privacy.
[26] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[27] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[28] Joseph Bonneau,et al. Towards Reliable Storage of 56-bit Secrets in Human Memory , 2014, USENIX Security Symposium.
[29] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[30] Yajie Tian,et al. Handbook of face recognition , 2003 .
[31] Mohammad Mannan,et al. From Very Weak to Very Strong: Analyzing Password-Strength Meters , 2014, NDSS.
[32] Tobias Scheffer,et al. Static prediction games for adversarial learning problems , 2012, J. Mach. Learn. Res..
[33] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[34] Anil K. Jain,et al. Likelihood Ratio-Based Biometric Score Fusion , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[35] Fabio Roli,et al. Pattern Recognition Systems under Attack: Design Issues and Research Challenges , 2014, Int. J. Pattern Recognit. Artif. Intell..
[36] Christof Paar,et al. Statistics on Password Re-use and Adaptive Strength for Financial Accounts , 2014, SCN.
[37] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[38] Matt Bishop,et al. Improving system security via proactive password checking , 1995, Comput. Secur..
[39] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[40] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[41] Prateek Mittal,et al. Privacy concerns of implicit secondary factors for web authentication , 2014 .
[42] Dawn Xiaodong Song,et al. The Emperor's New Password Manager: Security Analysis of Web-based Password Managers , 2014, USENIX Security Symposium.
[43] Thomas D. Wu. A Real-World Analysis of Kerberos Password Security , 1999, NDSS.
[44] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[45] Simon Marechal. Advances in password cracking , 2007, Journal in Computer Virology.
[46] Salvatore J. Stolfo,et al. Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[47] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.