Access the full text.
Sign up today, get DeepDyve free for 14 days.
L. Silva, A. Santos, J.D.S. Silva, Agustı́n Montes (2004)
A neural network application for attack detection in computer networks2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541), 2
C. Warrender, S. Forrest, Barak Pearlmutter (1999)
Detecting intrusions using system calls: alternative data modelsProceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
Jack Marin, Daniel Ragsdale, J. Surdu (2001)
A hybrid approach to the profile creation and intrusion detectionProceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 1
D. Gunetti, Claudia Picardi, G. Ruffo (2005)
Keystroke Analysis of Different Languages: A Case Study
J. Kauffman, A. Bazen, S. Gerez, R. Veldhuis (2003)
Grip-Pattern Recognition for Smart Guns
H. Feng, Oleg Kolesnikov, Prahlad Fogla, Wenke Lee, W. Gong (2003)
Anomaly detection using call stack information2003 Symposium on Security and Privacy, 2003.
Yongjian Fu, M. Shih (2002)
A Framework for Personal Web Usage Mining
Tracy Westeyn, Thad Starner (2004)
Recognizing song-based blink patterns: applications for restricted and universal accessSixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings.
C. Michael (2003)
Finding the vocabulary of program behavior data for anomaly detectionProceedings DARPA Information Survivability Conference and Exposition, 1
R. Veldhuis, A. Bazen, J. Kauffman, P. Hartel (2004)
Biometric verification based on grip-pattern recognition, 5306
C. Hilas (2005)
User Profiling for Fraud Detection in Telecommunication Networks
F. Monrose, A. Rubin (2000)
Keystroke dynamics as a biometric for authenticationFuture Gener. Comput. Syst., 16
J. Ramon, N. Jacobs, H. Blockeel (2002)
Opponent modeling by analysing play
R. Maxion, T. Townsend (2002)
Masquerade detection using truncated command linesProceedings International Conference on Dependable Systems and Networks
(2006)
‘Behaviour based identification of network intruders’
D. Yeung, Yuxin Ding (2003)
Host-based intrusion detection using dynamic and static behavioral modelsPattern Recognit., 36
Falko Ramann, C. Vielhauer, R. Steinmetz (2002)
Biometric applications based on handwritingProceedings. IEEE International Conference on Multimedia and Expo, 2
Kenneth Kaufman, G. Cervone, R. Michalski (2003)
An Application of Symbolic Learning to Intrusion Detection: Preliminary Results from the LUS Methodology
Robin Sommer, V. Paxson (2003)
Enhancing byte-level network intrusion detection signatures with context
Nam Nguyen, P. Reiher, G. Kuenning (2003)
Detecting insider threats by monitoring system call activityIEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.
Jeremy Goecks, J. Shavlik (2000)
Learning users' interests by unobtrusively observing their normal behavior
(2005)
BioPrivacy Initiative
Anil Jain, S. Dass, K. Nandakumar (2004)
Soft Biometric Traits for Personal Recognition Systems
Yoohwan Kim, Ju-Yeon Jo, K. Suh (2006)
Baseline Profile Stability for Network Anomaly DetectionThird International Conference on Information Technology: New Generations (ITNG'06)
A. Adler, R. Youmaran, S. Loyka (2006)
Towards a Measure of Biometric Information2006 Canadian Conference on Electrical and Computer Engineering
Z. Liu, S. Bridges (2005)
Dynamic learning of automata from the call stack log for anomaly detectionInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 1
Tracy Westeyn, Péter Pesti, Kwang-Hyun Park, Thad Starner (2005)
Biometric Identification using Song-Based Blink Patterns
(2006)
GUI interaction
D. Novikov (2005)
Neural networks to intrusion detection
R.V. Yampolskiy (2007)
Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems2007 41st Annual IEEE International Carnahan Conference on Security Technology
A. Wespi, M. Dacier, Hervé Debar (2000)
Intrusion Detection Using Variable-Length Audit Trail Patterns
H. Gray, P. Williams, L. Bannister (1996)
Gray's Anatomy: The Anatomical Basis of Medicine and Surgery
D. Wagner, Drew Dean (2001)
Intrusion detection via static analysisProceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
Gary Bartolacci, M. Curtin, Marc Katzenberg, N. Nwana, Sung-Hyuk Cha, C. Tappert (2005)
Long-Text Keystroke Biometric Applications over the Internet
N. Oliver, A. Pentland (2000)
Graphical models for driver behavior recognition in a SmartCarProceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511)
(2003)
‘Combining behaviour models to secure e-mail systems’
C. Marceau (2001)
Characterizing the behavior of a program using multiple-length N-grams
Kwanyong Lee, Hyeyoung Park (2003)
A New Similarity Measure Based on Intraclass Statistics for Biometric Systems
S. Hofmeyr, S. Forrest, Anil Somayaji (1998)
Intrusion Detection Using Sequences of System CallsJ. Comput. Secur., 6
Tom Fawcett, F. Provost (1997)
Adaptive Fraud DetectionData Mining and Knowledge Discovery, 1
P. Jourlin, J. Luettin, D. Genoud, Hubert Wassner (1997)
Acoustic-labial Speaker Verification Pattern Recognition Letters Acoustic-labial Speaker Verification
Ingo Schwab, Ivan Koychev (2000)
Adaptation to Drifting User's Interests
N. Kuge, T. Yamamura, O. Shimoyama, Andrew Liu (2000)
A Driver Behavior Recognition Method Based on a Driver Model FrameworkSAE transactions, 109
O. Shipilova (2003)
Person Recognition Based On Lip Movements
S. Bhatkar, Abhishek Chaturvedi, R. Sekar (2006)
Dataflow anomaly detection2006 IEEE Symposium on Security and Privacy (S&P'06)
Jonathon Giffin, S. Jha, B. Miller (2004)
Efficient Context-Sensitive Intrusion Detection
J. Ilonen (2009)
Keystroke Dynamics
(2004)
Signature/handwriting
(2002)
‘Discovering user interests from web browsing behaviour’
Michael Cahill, D. Lambert, J. Pinheiro, Don Sun (2002)
Detecting fraud in the real world
(2006)
Lip movement
H. Gamboa, A. Fred (2003)
An Identity Authentication System Based On Human Computer Interaction Behaviour
V. Matyás, Z. Ríha (2000)
Biometric Authentication Systems
R. Brause, Timm Langsdorf, Hans-Michael Hepp (1999)
Neural data mining for credit card fraud detectionProceedings 11th International Conference on Tools with Artificial Intelligence
Roman Yampolskiy, V. Govindaraju (2008)
Similarity Measure Functions for Strategy-Based BiometricsWorld Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2
P. Jourlin, J. Luettin, D. Genoud, Hubert Wassner (1997)
Acoustic-labial speaker verificationPattern Recognit. Lett., 18
O. Vel, Alison Anderson, M. Corney, G. Mohay (2001)
Mining e-mail content for author identification forensicsSIGMOD Rec., 30
Matthias Schonlau, W. DuMouchel, Wen-Hua Ju, A. Karr, Martin Theusan, Y. Vardi (2001)
Computer Intrusion: Detecting MasqueradesStatistical Science, 16
Ian Jermyn, A. Mayer, F. Monrose, M. Reiter, A. Rubin (1999)
The Design and Analysis of Graphical Passwords
H. Lei, S. Palla, V. Govindaraju (2004)
ER2: an intuitive similarity measure for on-line signature verification
N. Henderson, N. White, R. Veldhuis, P. Hartel, C. Slump (2002)
Sensing pressure for authentication
Mauricio Trujillo, Y. Asfaw, S. Shirmohammadi, A. Adler, Abdulmotaleb Saddik (2006)
Haptic-Based Biometrics: A Feasibility Study2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems
K. Renaud (2004)
Quantifying the quality of web authentication mechanisms: a usability perspectiveJournal of Web Engineering, 3
(2004)
‘Signature verification: a popular biometric technology’
R. Pearl (1914)
BiometricsThe American Naturalist, 48
Dima Novikov, Roman Yampolskiy, L. Reznik (2006)
Anomaly Detection Based Intrusion DetectionThird International Conference on Information Technology: New Generations (ITNG'06)
P. Stanton, W. Yurcik, L. Brumbaugh (2005)
FABS: file and block surveillance system for determining anomalous disk accessesProceedings from the Sixth Annual IEEE SMC Information Assurance Workshop
(2005)
Caslon Analytics
Yingjiu Li, Ningning Wu, X. Wang, S. Jajodia (2002)
Enhancing Profiles for Anomaly Detection Using Time GranularitiesJ. Comput. Secur., 10
C. Varenhorst, M. Kleek, L. Rudolph (1999)
Under the Direction of
V. Dao, R. Vemuri, S. Templeton (2000)
Profiling users in the UNIX os environment
A. Humm, J. Hennebert, R. Ingold (2009)
Combined Handwriting and Speech Modalities for User AuthenticationIEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 39
Ahmed Ahmed, I. Traoré (2005)
Anomaly intrusion detection based on biometricsProceedings from the Sixth Annual IEEE SMC Information Assurance Workshop
Kwanyong Lee, Hyeyoung Park (2003)
A New Similarity Measure Based on Intraclass Statistics for Biometrie SystemsETRI Journal, 25
T. Lane (1999)
An Application of Machine Learning to Anomaly Detection
A. Seleznyov, S. Puuronen (1999)
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
T. Goldring (2003)
User Pro ling for Intrusion Detection in Windows NT
N. Henderson, T. Papakostas, N. White, P. Hartel (2001)
Polymer thick-film sensors: possibilities for smartcard biometricsIEEE Transactions on Electron Devices
Wenke Lee, S. Stolfo, K. Mok (1999)
A data mining framework for building intrusion detection modelsProceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
Dima Novikov, Roman Yampolskiy, Leon Reznik (2006)
ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION2006 IEEE Long Island Systems, Applications and Technology Conference
K. Ilgun, R. Kemmerer, Phillip Porras (1995)
State Transition Analysis: A Rule-Based Intrusion Detection ApproachIEEE Trans. Software Eng., 21
Siwei Lyu, D. Rockmore, H. Farid (2004)
A digital technique for art authenticationProceedings of the National Academy of Sciences of the United States of America, 101 49
M. Banikazemi, D. Poff, B. Abali (2005)
Storage-based intrusion detection for storage area networks (SANs)22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05)
Georgia Frantzeskou, Stephen MacDonell, E. Stamatatos (2010)
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process
(2007)
Comparison of biometric techniques', retrieved May 27
(2000)
Cluster Analysis for Large Scale Gene Expression Studies, Masters Thesis
Moshe Koppel, Jonathan Schler (2004)
Authorship verification as a one-class classification problemProceedings of the twenty-first international conference on Machine learning
F. Bergadano, D. Gunetti, Claudia Picardi (2002)
User authentication through keystroke dynamicsACM Trans. Inf. Syst. Secur., 5
Z. Zhang, C. Manikopoulos (2003)
Investigation of neural network classification of computer network attacksInternational Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.
Xiaofan Lin, S. Simske (2004)
Phoneme-less hierarchical accent classificationConference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004., 2
Danielle Liu, F. Huebner (2002)
Application profiling of IP traffic27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002.
(1980)
‘Computer security threat monitoring and surveillance’
A. Jansen, D. Dowe, G. Farr (2000)
Inductive Inference of Chess Player Strategy
S. Schimke, C. Vielhauer, P. Dutta, T. Basu, A. Rosa, J. Hansen, J. Dittmann, B. Yegnanarayana (2004)
Cross Cultural Aspects of Biometrics
H. Gamboa, A. Fred (2004)
A Behavioural Biometric System Based on Human Computer Interaction
(1993)
Detecting Intruders in Computer Systems
(2004)
‘To catch a cheat, education next’
Hakan Erdogan, Aytül Ereil, H. Abut (2007)
Experiments on decision fusion for driver recognition
T. Lane, C. Brodley (1997)
Detecting the Abnormal: Machine Learning in Computer Security
Kei Igarashi, C. Miyajima, K. Itou, K. Takeda, F. Itakura, H. Abut (2004)
Biometric identification using driving behavioral signals2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), 1
A. Kale, A. Sundaresan, A. Rajagopalan, Naresh Cuntoor, A. Roy-Chowdhury, V. Krüger, R. Chellappa (2004)
Identification of humans using gaitIEEE Transactions on Image Processing, 13
U. Uludag, Sharath Pankanti, S. Prabhakar, Anil Jain (2004)
Biometric cryptosystems: issues and challengesProceedings of the IEEE, 92
A. Tsymbal (2004)
The problem of concept drift: definitions and related work
T. Wark, D. Thambiratnam, S. Sridharan (1997)
Person authentication using lip informationTENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162), 1
Shamalee Deshpande, S. Chikkerur, V. Govindaraju (2005)
Accent classification in speechFourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)
D. Denning (1986)
An Intrusion-Detection Model1986 IEEE Symposium on Security and Privacy
(2001)
‘Modeling and prediction of human driver behaviour’
J.P. Campbell (1997)
Speaker recognition: a tutorialProc. IEEE, 85
R. Plamondon, G. Lorette (1989)
Automatic signature verification and writer identification - the state of the artPattern Recognit., 22
Z. Ciota (2004)
Speaker verification for multimedia application2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), 3
G. Prassas, K. Pramataris, Olga Papaemmanouil (2001)
Dynamic Recommendations in Internet Retailing
Hakan Erdogan, A. Erçil, H. Ekenel, S. Bilgin, I. Eden, M. Kirisçi, H. Abut (2005)
Multi-modal Person Recognition for Vehicular Applications
E. Spafford, Stephen Weeber (1993)
Software forensics: Can we track code to its authors?Comput. Secur., 12
Govindaraju
Roman Yampolskiy, V. Govindaraju (2006)
Use of behavioral biometrics in intrusion detection and online gaming, 6202
S. Schuckers (2002)
Spoofing and Anti-Spoofing MeasuresInf. Secur. Tech. Rep., 7
Stephan Al-Zubi, Arslan Brömme, Klaus Tönnies (2003)
Using an Active Shape Structural Model for Biometric Sketch Recognition
Yong Zhu, T. Tan, Yunhong Wang (2000)
Biometric personal identification based on handwritingProceedings 15th International Conference on Pattern Recognition. ICPR-2000, 2
Arslan Brömme, Stephan Al-Zubi (2003)
Multifactor Biometric Sketch Authentication
L. Ballard, F. Monrose, D. Lopresti (2006)
Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing
K. Thompson, G. Miller, R. Wilder (1997)
Wide-area Internet traffic patterns and characteristicsIEEE Netw., 11
S. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu (2003)
A Behavior-Based Approach to Securing Email Systems
(2004)
Proving and improving authorship attribution', Proceedings of CaSTA-04 The Face of Text
M. Orozco, Y. Asfaw, A. Adler, S. Shirmohammadi, A. Saddik (2005)
Automatic Identification of Participants in Haptic Systems2005 IEEE Instrumentationand Measurement Technology Conference Proceedings, 2
K. Delac, M. Grgic (2004)
A survey of biometric recognition methodsProceedings. Elmar-2004. 46th International Symposium on Electronics in Marine
H. Gamboa, A. Fred (2004)
A behavioral biometric system based on human-computer interaction, 5404
C. Vielhauer, S. Lucey, J. Dittmann, Tsuhan Chen (2004)
Biometrics : Challenges arising from Theory to Practice
Hernan Grosser, P. Britos, Ramón García-Martínez (2005)
Detecting Fraud in Mobile Telephony Using Neural Networks
Wei-Ho Tsai, H. Wang (2006)
Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signalsIEEE Transactions on Audio, Speech, and Language Processing, 14
R. Cappelli, D. Maio, D. Maltoni, J. Wayman, Anil Jain (2006)
Performance evaluation of fingerprint verification systemsIEEE Transactions on Pattern Analysis and Machine Intelligence, 28
Ahmed Ahmed, I. Traoré (2005)
Detecting Computer Intrusions Using Behavioral Biometrics
C. Ko, George Fink, K. Levitt (1994)
Automated detection of vulnerabilities in privileged programs by execution monitoringTenth Annual Computer Security Applications Conference
Ashish Garg, Ragini Rahalkar, Shambhu Upadhyaya, K. Kwiat (2006)
Profiling Users in GUI Based Systems for Masquerade Detection2006 IEEE Information Assurance Workshop
N. Ratha, A. Senior, R. Bolle (2001)
Automated Biometrics
Roman Yampolskiy (2007)
Human Computer Interaction Based Intrusion DetectionFourth International Conference on Information Technology (ITNG'07)
J. Dugelay, J. Junqua, Constantine Kotropoulos, R. Kuhn, F. Perronnin, I. Pitas (2002)
Recent advances in biometric person authentication2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, 4
B. Herbst, H. Coetzer (1998)
On an Offline Signature Verification System
Youhui Zhang, Dongsheng Wang (2006)
Research on object-storage-based intrusion detection12th International Conference on Parallel and Distributed Systems - (ICPADS'06), 1
L. Ballard, D. Lopresti, F. Monrose (2006)
Evaluating the Security of Handwriting Biometrics
Maja Pusara, C. Brodley (2004)
User re-authentication via mouse movements
Adam Pennington, John Strunk, J. Griffin, Craig Soules, G. Goodson, G. Ganger (2003)
Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior
J. Luettin, N. Thacker, S. Beet (1996)
Speaker identification by lipreadingProceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96, 1
M. Nixon, J. Carter (2004)
On gait as a biometric: Progress and prospects2004 12th European Signal Processing Conference
(2001)
Registry access
L. Lam, Wei Li, T. Chiueh (2006)
Accurate and Automated System Call Policy-Based Intrusion PreventionInternational Conference on Dependable Systems and Networks (DSN'06)
E. Erzin, Y. Yemez, A. Tekalp, A. Erçil, Hakan Erdogan, H. Abut (2006)
Multimodal person recognition for human-vehicle interactionIEEE Multimedia, 13
Roman Yampolskiy (2007)
Motor-Skill Based Biometrics
(2006)
‘Personal identifiers in musicians’ finger movement dynamics’
M. Crompton (2004)
Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy?Australian Journal of Forensic Sciences, 36
B. Kernighan, P. Plauger (1974)
Programming style
H. Gray
Gray's Anatomy
M. Curtin, C. Tappert, M. Villani, Giang Ngo, J. Simone, Sung-Hyuk Cha (2006)
Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study
(2006)
‘Trends in biometrics and user acceptance’
Anil Jain, K. Nandakumar, A. Ross (2005)
Score normalization in multimodal biometric systemsPattern Recognit., 38
S. Dahel, Q. Dominquez (2003)
Accuracy performance analysis of multimodal biometricsIEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.
Chiraz BenAbdelkader, Ross Cutler, L. Davis (2002)
Person identification using automatic height and stride estimationObject recognition supported by user interaction for service robots, 4
Anil Jain, Sharath Pankanti, S. Prabhakar, Lin Hong, A. Ross (2004)
Biometrics: a grand challengeProceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., 2
J. Griffin, Adam Pennington, John Bucy, Deepa Choundappan, N. Muralidharan, G. Ganger (2003)
On the Feasibility of Intrusion Detection Inside Workstation Disks
T. Nakajima
TappingJournal of the Japan Society for Precision Engineering
Frank Apap, A. Honig, Shlomo Hershkop, E. Eskin, S. Stolfo (2002)
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses
Conrad Sanderson, K. Paliwal (2001)
Information fusion for robust speaker verification
A. Ito, Xinyue Wang, Motoyuki Suzuki, S. Makino (2005)
Smile and laughter recognition using speech processing and face recognition from conversation video2005 International Conference on Cyberworlds (CW'05)
(2001)
‘TV that watches you: the prying eyes of interactive television’
(2006)
Stats and analysis', Poker-edge.com, retrieved June 7
(2002)
‘Automatic speechreading with applications to speaker verification’
J. Colombi, D. Ruck, T. Anderson, S. Rogers, M. Oxley (1996)
Cohort selection and word grammar effects for speaker recognition1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, 1
C. Michael, Anup Ghosh (2000)
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report
(2004)
Developed mostly for gun control applications
R. Bolle, J. Connell, Sharath Pankanti, N. Ratha, A. Senior (2003)
Guide to Biometrics
Arslan Brömme (2003)
A classification of biometric signatures
Reema Bhagtani, Hemal Chheda (2005)
BIOMETRICS : A FURTHER ECHELON OF SECURITY Siddhesh Angle ,
Mauricio Trujillo, I. Shakra, Abdulmotaleb Saddik (2005)
Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns
(2006)
Haptic systems are computer input/output devices which can provide us with information about direction, pressure, force, angle, speed, and position of user’s interactions (Orozco et al., 2005
Gaurav Gupta, C. Mazumdar, M. Rao (2004)
Digital Forensic Analysis of E-Mails: A Trusted E-Mail ProtocolInt. J. Digit. EVid., 2
Lin Mok, W. Lau (2004)
Person authentication using ASM based lip shape and intensity information2004 International Conference on Image Processing, 2004. ICIP '04., 1
E. Stamatatos, N. Fakotakis, G. Kokkinakis (1999)
Automatic Authorship Attribution
H. Halteren (2004)
Linguistic Profiling for Authorship Recognition and Verification
Anil Jain, S. Dass, K. Nandakumar (2004)
Can soft biometric traits assist user recognition?, 5404
Stephen MacDonell, D. Buckingham, A. Gray, P. Sallis (1997)
Software Forensics: Extending Authorship Analysis Techniques to Computer Programs
S. Latifi, Nimalan Solayappan (2006)
A Survey of Unimodal Biometric Methods
Satprem Pamudurthy, E. Guan, K. Mueller, M. Rafailovich (2005)
Dynamic Approach for Face Recognition Using Digital Image Skin Correlation
J. Mason, J. Brand, R. Auckenthaler, F. Deravi, C. Chibelushi (1999)
Lip signatures for automatic person recognition1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451)
Anil Jain, A. Ross, S. Prabhakar (2004)
An introduction to biometric recognitionIEEE Transactions on Circuits and Systems for Video Technology, 14
This study is a survey and classification of the state-of-the-art in behavioural biometrics which is based on skills, style, preference, knowledge, motor-skills or strategy used by people while accomplishing different everyday tasks such as driving an automobile, talking on the phone or using a computer. The authors examine current research in the field and analyse the types of features used to describe different types of behaviour. After comparing accuracy rates for verification of users using different behavioural biometric approaches, researchers address privacy issues which arise or might arise in the future with the use of behavioural biometrics.
International Journal of Biometrics – Inderscience Publishers
Published: Jan 1, 2008
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.