최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기International journal of advanced smart convergence, v.5 no.3, 2016년, pp.40 - 46
Ho, Jiacang (Department of Ubiquitous IT, Graduate School, Dongseo University) , Kang, Dae-Ki (Department of Computer & Information Engineering, Dongseo University)
The internet allows the information to flow at anywhere in anytime easily. Unfortunately, the network also becomes a great tool for the criminals to operate cybercrimes such as identity theft. To prevent the issue, using a very complex password is not a very encouraging method. Alternatively, keystr...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
M. M. Al-Jarrah, "An anomaly detector for keystroke dynamics based on medians vector proximity," Journal of Emerging Trends in Computing and Information Sciences, vol. 3, no. 6, pp. 988-993, 2012.
S. Cho, C. Han, D. H. Han, and H.-I. Kim, "Web-based keystroke dynamics identity verification using neural network," Journal of organizational computing and electronic commerce, vol. 10, no. 4, pp. 295-307, 2000.
R. Giot, M. El-Abed, and C. Rosenberger, "Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis," in Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), 2012 Eighth International Conference on. IEEE, 2012, pp. 11-15.
S. Z. S. Idrus, E. Cherrier, C. Rosenberger, and P. Bours, "Soft biometrics for keystroke dynamics," in Image analysis and recognition. Springer, 2013, pp. 11-18.
K. S. Killourhy, R. Maxion et al., "Comparing anomaly-detection algorithms for keystroke dynamics," in Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on. IEEE, 2009, pp. 125-134.
J. Montalvao, E. O. Freire, M. A. Bezerra Jr, and R. Garcia, "Contributions to empirical analysis of keystroke dynamics in passwords," Pattern Recognition Letters, vol. 52, pp. 80-86, 2015.
Z. Syed, S. Banerjee, and B. Cukic, "Leveraging variations in event sequences in keystroke-dynamics authentication systems," in High- Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on. IEEE, 2014, pp. 9-16.
X. Wang, F. Guo, and J.-f. Ma, "User authentication via keystroke dynamics based on difference subspace and slope correlation degree," Digital Signal Processing, vol. 22, no. 5, pp. 707-712, 2012.
E. Yu and S. Cho, "Keystroke dynamics identity verification - its problems and practical solutions," Computers & Security, vol. 23, no. 5, pp. 428-440, 2004.
R. Moskovitch, C. Feher, A. Messerman, N. Kirschnick, T. Mustafic, A. Camtepe, B. Lohlein, U. Heister, S. Moller, L. Rokach et al., "Identity theft, computers and behavioral biometrics," in Intelligence and Security Informatics, 2009. ISI'09. IEEE International Conference on. IEEE, 2009, pp. 155-160.
A. N. H. Nahin, J. M. Alam, H. Mahmud, and K. Hasan, "Identifying emotion by keystroke dynamics and text pattern analysis," Behaviour & Information Technology, vol. 33, no. 9, pp. 987-996, 2014.
T. G. Dietterich, "Ensemble methods in machine learning," in Multiple classifier systems. Springer, 2000, pp. 1-15.
J. Ho and D.-K. Kang, "Sequence alignment with dynamic divisor generation for keystroke dynamics based user authentication," Journal of Sensors, vol. 2015, 2015.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.